Enterprise Key Management and Protection Whitepaper
Thinking about how to manage and protect your encryption keys in the wake of the digital transformation? This white paper provides a detailed analysis of available key management technologies to help you choose the best approach for your organization.
Get an in-depth explanation of how Unbound uses MPC, a mathematically proven method to secure keys on any device, anywhere. Learn how advancements in Multiparty Computation (MPC) research is leading us to the forefront of exciting application frontiers for security and privacy.
Unbound Solutions for Financial Services
Offering consumer-friendly experiences such as mobile banking, while protecting sensitive data is a challenge for financial institutions. In this Solution Brief, learn companies can manage a secure and flexible crypto foundation across the cloud, server and endpoint.
How to Control Your Own Keys (CYOK) in the Cloud
Learn how CYOK lets you confidently migrate your valued business applications and data to the cloud by maintaining full control of a foundational security element – your cryptographic keys.
Infographic: Software-Defined Cryptography
Download our infographic that will walk you through how leading global Fortune 500 organizations are doing to protect their crypto keys in the wake of digital transformation.
GDPR and CLOUD Act Executive Brief
Both GDPR and the CLOUD Act are aimed at modernizing past data privacy legislation, however they seemingly contradict one another. Our Executive Brief will shed light on how to comply with both GDPR and the CLOUD Act, and how to ensure full control of your encryption keys while complying with these two new frameworks.
Code Signing Solution Brief
Companies that work with Code Signing are under a sophisticated cyber threat landscape that HSMs cannot sufficiently guard against. The Unbound Key Control (UKC) code signing solution delivers pure-software HSM-level security covering all development teams across your entire infrastructure.
Case Study Enterprise Code Signing Solution
In this case study we pose challenges facing a top tech company, including the large number of developers and global sites, a mix of on-premise and cloud-based development environments and how to tackle the problem of agility vs. scalability.
Cyber Security Solutions for Law Firms
In today’s digital climate with growing vulnerabilities and threats, law firms with a comprehensive enterprise-wide solution to protect their clients’ data gain competitive advantage. Unbound offers client-friendly experiences without compromising security on any cloud, server or endpoint.
Introducing Unbound Crypto Asset Services Platform
What are major considerations and risks to be taken into account when building a cryptocurrency service, and introduce Unbound’s Cryptocurrency Security Platform and how it can be used to secure cryptocurrency services.
A New Risk Management Paradigm for Cloud Computing
How to Go Beyond BYOK with CYOK (Control Your Own Keys): Learn how SaaS/IaaS providers and their customers can work together to enable CYOK as a defense to ensure sensitive assets remain secure even when a breach nightmare scenario can turn into reality.
New Standards for Code Signing
Best practices for implementing secure code signing--explore new approaches for code signing, and review best practices. We’ll highlight some of the new challenges in protecting code signing private keys and certificates in today’s world of increased virtualization, scaling and distribution.
Authentication & Identity in the Digital Banking Era
The emergence of multiple online services in various digital channels and the rise of Fintech, combined with the mobility and IoT revolution is rapidly virtualizing banking – forcing organizations to rethink current solutions to authentication and identity.
Multi-Party Computation (MPC): From Backstage to Center Stage
What is Secure Multiparty Computation (MPC) and why has it suddenly emerged as a powerful, game-changing technology being used in more and more security and privacy applications? We will explore how MPC makes the impossible, possible.
Securing Data in Perimeter-less, Multi-Cloud Environments
In order to deliver the digital apps & services we use on a daily basis, the financial services industry is transitioning to new cloud-native agile delivery models of apps, containers, and dockers – bringing about new challenges and solutions.
The Magic of MPC
Unbound co-founder, Professor Nigel Smart unveils some of the magic behind Multiparty Computation (MPC) including examples of use in real-world scenarios. You don’t have to be a cryptographer or a mathematician to enjoy this webinar. Suitable for both math freaks and math-phobes!
Securing Data-in-Use in the Cloud: Myths and Facts
Recorded Live at BlueHat IL 2017, Prof. Yehuda Lindell talks about what it means to secure data while in use in the cloud, and demystifies solutions that do and do not work!
Unbound Key Control
Unbound Key Control is the first pure-software key management and key protection system that delivers hardware-level security guarantees. Learn how Unbound Key Control can help your organization secure its crypto keys, whether its in the cloud, on-premises, or any hybrid combination thereof.
Unbound is the only lightweight software key protection solution that enables every endpoint device to have a virtual hardware security module, where private keys can be stored securely with a trust level comparable to dedicated secure hardware – creating a consistent level of security among all BYOD devices that connect to your applications.
Unbound for Azure Marketplace
Unbound Key Control for Azure
The Unbound Key Control (UKC) for Azure Marketplace client software allows general-purpose application servers use UKC Crypto Services as a plug-in to its security framework. The client acts as the UKC service broker.
Unbound Key Control for Azure Marketplace Solution Brief
Unbound Key Control (UKC) lets you manage and control keys in any application deployed in Azure. This pure-software solution is easy to deploy and maintain, while giving you unmatched levels of security and control for your crypto keys in the cloud.
Episode #1 - Cryptographic Algorithms & Multiparty Computation (MPC) | Ask the Professor
Is it possible to use MPC to compute the outcome with two or more secret inputs from a number of entities while keeping the inputs private?” and more. Prof. Nigel Smart answers the internet’s most asked questions about encryption.
Episode #2 - Intro to Cryptography and a History Lesson | Ask the Professor
Ever wondered what the difference between public key vs. private key cryptography actually means? Furthermore, why is quantum cryptography even important? Prof. Smart answers all of your questions, and also explains how cryptography has changed in the past five years.
Episode #3 – Future of Cryptography & The Significance of the Enigma Machine | Ask the Professor
Where is crypto headed? What does this mean for Post-Quantum Cryptography, Privacy and Machine Learning? Prof. Nigel Smart discusses the future of crypto, and explains why the breaking of the Enigma Machine brought the end of WWII much faster.
Episode #4 – Ideal World vs. Real World, Quantum Cryptography & The Lorenz Cipher | Ask the Professor
Will Quantum Key Distribution ever replace Standard Cryptography (as we know it today). Prof. Smart discusses German Lorenz Cipher, which was even more complex than Enigma.
Episode #5- Yao's Millionaire Problem, Where to Study Cryptography and more | Ask the Professor
Yao's Millionaire Problem (how to reveal who is the richest millionaire w/out revealing how much money they actually have), in the case of two or more parties. Additionally, what do you do if the message is longer than the keystream? And finally, how and when should one study cryptography?
Episode #6 – Introducing a Cryptographic Algorithm, MPC Applications & | Ask the Professor
Do you happen to have a crypto algorithm you'd like to introduce? Hint: don't patent it if you want it to actually be used. Prof. Nigel Smart discusses cryptographic algorithms, applications of multiparty computation, and answers whether we can bioengineer public-key cryptography into human voice.
Episode #7- MPC & Online Dating, Cryptography "Games", P vs. NP | Ask the Professor
In this video, Prof. Nigel Smart answers interesting questions whether Multiparty Computation (MPC) can be applied to online dating, how games are used in cryptography incl. system breaking, and if we ever solved the P vs. NP problem, could we replace public key cryptography?
Episode #8 - Double layer encryption to better secure information? | Ask the Professor
In this video, Prof. Nigel Smart answers whether double layers of encryption make information more secure. What’s the best way to make sure data is protected when one layer can be breached? Prof. Smart answers here!
Episode #9 - Garbled Circuits, books on cryptography and what cryptography solves | Ask the Professor
Prof. Nigel smart answers: What are garbling circuits? What books would you recommend to learn more about cryptography? Is cryptography concerned with worst or average case hardness to solve problems?
Episode #10- Prof. Smart Explains Multiparty Computation and Data Signing with Keys | Ask the Professor
Prof. Nigel Smart answers how does multiparty computation work? How does data signing work with public keys and secret keys? And we've all been wondering: Why do you love being a cryptographer and does that make you a good or bad guy?
Episode #11 - Distributed Trust and the Move to Quantum Computers | Ask the Professor
Prof. Smart gives an analogy about distributed trust. Why is better to learn classical cryptography vs. quantum key distribution? And the question we’ve all been wondering: Why would an academic cryptography expert start a company?
Episode #12 - Quantum Computers, Govt. Back Door Policies and Garbled Circuits | Ask the Professor
Prof. Smart answers how cryptographers will deal with Quantum computers that break the hard math which are the foundations of cryptography. Prof. Smart discusses government back-door policies with crypto and why garbled circuits can't be reused.
Unbound Wins the Prime Minister’s Award for Israeli Innovation
Unbound received this award for its strides in protecting data and private information in today’s increasingly interconnected digital landscape. At the ceremony, PM Netanyahu highlighted Unbound’s vital contribution of building trust in an untrusted digital world.
Unbound Key Control - Technical Documents
This is where you can find all the technical documents about Unbound Key Control.
Unbound Crypto-of-Things - Technical Documents
This is where you can find all the technical documents about Unbound Crypto-of-Things.