Authentication started as a solution for secure computing - but has become an operational burden on organizations and introduced security vulnerabilities every step of the way. Learn more about how this conundrum can be solved with new cryptographic key technology.
The concept of “going passwordless” is not new. Despite this, adoption continues to be slow due to the fact that software-only platforms are not secure enough and hardware presents several user experience and operations issues. Learn more about advanced authentication and the security-usability tradeoff in this whitepaper.
Hardware Security Modules (HSMs) are industry-standard for cryptographic key protection - but in 2020, they may not be enough. Between a global move toward eork-from-anywhere and an ever-increasing proliferation of IoT and IIoT devices, HSM is a wired technology for a wireless world.
Organizations considering adopting digital assets into their custody services must consider  regulatory requirements when choosing their security infrastructure setup. Learn more about factors to consider when choosing a security platform.
The incorporation of digital assets into the mainstream financial services industry presents unique challenges. This eBook discusses digital security, key management & custody types, and regulations for institutional digital asset custody.
The past year has been undeniably marked by the entrance of professional traders and institutions into digital asset adoption. Learn more about the next steps necessary, including infrastructure, tools & regulation, for digital assets to reach mainstream global acceptance.
Secure code signing is usually a trade-off between compliance and convenience. MiTek is able to sign code faster and safer with Unbound's code signing solution. Learn more about how to optimize your code signing experience. 
Professor Yehuda Lindell explains multi-party computation (MPC) from research to practice. Written with non-techies in mind, you don’t need to be a cryptography expert to learn about MPC.  
In this survey, Unbound Tech and the Cyber Security Competency Group (CSCG) examine cryptographic key management practices across multiple sectors – and uncovers the truth about key management practices for enterprise in 2020.

Unbound and Google Cloud Platform are now integrated. Learn more about how Unbound enables Google customers to maintain control over their cryptographic keys without compromising the usability or access to critical applications or services in the cloud.

While cloud computing shows year-after-year growth, security remains a major roadblock for cloud adoption for organizations. But it doesn’t have to be – this eBook discusses how you can control your keys in the cloud (CYOK).
Over the past few years, governments have requested data on users from technology companies. Statistics show us that government requests for data will continue to increase. That's why it's important to learn more about these requests, and what impact they can have on your business.
The CLOUD Act raises new challenges regarding data residency, and how it impacts both multinational organizations as well as domestic organizations. Download your copy and learn more about how to mitigate this new world of data privacy.

Learn more about how Archax, is securing their custody service with Unbound CASP—providing the airtight security structure and the credibility and industry credentials required for Archax's institutional customers. 

How Secure Multi-Party Computation (SMPC) enables digital currency exchanges to match, and enhance trading services. Secure digital assets, and increase trading volume at the click of a button.
Liquid, a major APAC-based exchange, partnered with Unbound to expand their operations, grow their volume, and optimize -- all while maximizing their key security and management.
Binfinity couldn't compromise between high-level security, high-capacity trading volume, and high transaction speed to meet the demands of its enterprise clients. With Unbound, they didn't have to.
There are different approaches to implementing a code signing solution within an in organization. Our Executive Brief outlines all approaches on the market, and highlights the pros and cons of each.
Organizations can now benefit from the elasticity, manageability, automation and crypto-agility capabilities that Unbound products deliver, with the assurance that they meet the industry-accepted security standard for cryptographic modules issued by NIST.
Organizations deploying cryptographic products should evaluate their practical security capabilities and alignment with a modern IT architecture. This brief shows how Unbound’s FIPS 140-2 Level 2 certification provides vital assurance that cryptographic modules meet industry-accepted standards for protecting keys.
Thinking about how to manage and protect your encryption keys in the wake of the digital transformation? This white paper provides a detailed analysis of available key management technologies to help you choose the best approach for your organization.
Get an in-depth explanation of how Unbound uses MPC, a mathematically proven method to secure keys on any device, anywhere. Learn how advancements in Multiparty Computation (MPC) research is leading us to the forefront of exciting application frontiers for security and privacy.
In a hybrid cloud environment, managing distinct tools from CSPs and keeping organizational security policies consistent across platforms and providers is a challenge. Read here for key insights to inform your organization’s digital transformation strategy
Enterprises have long relied on hardware security modules (HSMs) to secure cryptographic keys throughout each stage of their life cycle, but can HSMs fully adapt to new digital needs? Read this comprehensive guide on traditional and virtual HSMs.
A lot of research has been done on various usage models and the security of Intel SGX, and the side channel attacks on SGX.  This paper shows that these attacks are extremely effective at extracting private data from inside an SGX enclave.
Offering consumer-friendly experiences such as mobile banking, while protecting sensitive data is a challenge for financial institutions. In this Solution Brief, learn companies can manage a secure and flexible crypto foundation across the cloud, server and endpoint.
Download our infographic that will walk you through how leading global Fortune 500 organizations are doing to protect their crypto keys in the wake of digital transformation.
In this guide we discuss why enterprises need a central code signing key protection & key management platform, and best practices to implement secure code signing.
Companies that work with Code Signing are under a sophisticated cyber threat landscape that HSMs cannot sufficiently guard against. The Unbound Key Control (UKC) code signing solution delivers pure-software HSM-level security covering all development teams across your entire infrastructure.
In this case study we pose challenges facing a top tech company, including the large number of developers and global sites, a mix of on-premise and cloud-based development environments and how to tackle the problem of agility vs. scalability.
If your exchange, custodial service, or enterprise manages blockchain keys, you’ll want security options that not only keep your systems safe, but can move with the rapidly-changing blockchain market. Here are 6 Signs Your Crypto Asset Protection Isn’t Good Enough.
Bank-Grade Security for Crypto Asset Trading and Custody Service, Secure your assets with the confidence of knowing your crypto asset keys never exist in the clear, ever.
In today’s digital climate with growing vulnerabilities and threats, law firms with a comprehensive enterprise-wide solution to protect their clients’ data gain competitive advantage. Unbound offers client-friendly experiences without compromising security on any cloud, server or endpoint.

On-Demand Webinars

Is Your Digital Asset Custody Institution-Grade? Watch to find out.

Sal Ternullo from KPMG and Professor Yehuda Lindell, CEO of Unbound Tech discuss trends in this period of institutional digital asset custody adoption and the challenges of this emerging sector.

High Speed and Secure: The Future of Cryptocurrency Exchanges

Binance Chief Strategy Officer, Gin Chao and Unbound Tech’s CEO & Co-Founder, Prof. Yehuda Lindell, come together to discuss cryptocurrency trends, and how to secure the infrastructure of cryptocurrency exchanges to accommodate high volume transactions.  

Code Signing Strategies for the Modern Enterprise

This webinar deep dives into recent hacks and discusses the challenges of implementing and deploying enterprise-grade code signing solutions that can centrally manage and protect all of an organizations’ code signing private keys.

What All Banks Should Know

Watch this webinar to learn about the current solutions for key management, challenges to current approaches to cybersecurity and practical examples of how and why software-defined cryptography is a superior solution especially for financial institutions. 

How to Securely Go Cloud-Native

In this webinar, we will provide an overview of the main security risks in cloud-native environments and address some of the solutions being adopted by leading Fortune 500 enterprises with the highest security requirements.

Introducing Unbound Crypto Asset Services Platform

What are major considerations and risks to be taken into account when building a cryptocurrency service, and introduce Unbound’s Cryptocurrency Security Platform and how it can be used to secure cryptocurrency services.

Key Protection & Governance in Blockchain

Private key protection in any blockchain infrastructure is critical and blockchain cannot rely on traditional key protection methods. What are new ways to protect keys so blockchain can deliver on its promises?

A New Risk Management Paradigm for Cloud Computing

How to Go Beyond BYOK with CYOK (Control Your Own Keys):  Learn how SaaS/IaaS providers and their customers can work together to enable CYOK as a defense to ensure sensitive assets remain secure even when a breach nightmare scenario can turn into reality.

New Standards for Code Signing

Best practices for implementing secure code signing--explore new approaches for code signing, and review best practices. We’ll highlight some of the new challenges in protecting code signing private keys and certificates in today’s world of increased virtualization, scaling and distribution.

Authentication & Identity in the Digital Banking Era

The emergence of multiple online services in various digital channels and the rise of Fintech, combined with the mobility and IoT revolution is rapidly virtualizing banking – forcing organizations to rethink current solutions to authentication and identity.

Multi-Party Computation (MPC): From Backstage to Center Stage

What is Secure Multiparty Computation (MPC) and why has it suddenly emerged as a powerful, game-changing technology being used in more and more security and privacy applications? We will explore how MPC makes the impossible, possible.

Keeping Control of Your Keys in the Public Cloud

Learn how Unbound Key Control lets you maintain full control of your private keys in any public cloud environments. No one, not even the cloud provider, can access your keys.

Securing Data in Perimeter-less, Multi-Cloud Environments

In order to deliver the digital apps & services we use on a daily basis,  the financial services industry is transitioning to new cloud-native agile delivery models of apps, containers, and dockers – bringing about new challenges and solutions.

The Magic of MPC

Unbound co-founder, Professor Nigel Smart unveils some of the magic behind Multiparty Computation (MPC) including examples of use in real-world scenarios. You don’t have to be a cryptographer or a mathematician to enjoy this webinar. Suitable for both math freaks and math-phobes!

Securing Data-in-Use in the Cloud: Myths and Facts

Recorded Live at BlueHat IL 2017, Prof. Yehuda Lindell talks about what it means to secure data while in use in the cloud, and demystifies solutions that do and do not work!


Find out today how the Crypto Asset Security Patform (CASP) can revolutionize your crypto asset security. Download the datasheet now!
Unbound Key Control is the first pure-software key management and key protection system that delivers hardware-level security guarantees. Learn how Unbound Key Control can help your organization secure its crypto keys, whether its in the cloud, on-premises, or any hybrid combination thereof.
Unbound is the only lightweight software key protection solution that enables every endpoint device to have a virtual hardware security module, where private keys can be stored securely with a trust level comparable to dedicated secure hardware – creating a consistent level of security among all BYOD devices that connect to your applications.


A preview of everything you can do in the Unbound NextGen vHSM® Interactive Demo, we’ve prepared this video tutorial that gives you a behind the scenes look of how to install, run, and test features in the demo.
Secure your MongoDB encryption keys with Unbound NextGen vHSM®.
How to use Unbound NextGen vHSM® to protect Microsoft CA root certificates.
How to use Unbound NextGen vHSM® as part of a code signing interface.
A walkthrough of using Unbound NextGen vHSM® to secure and manage app-level encryption keys.
How to integrate Unbound NextGen vHSM® with a SIEM, to extensively audit key management events occurring in your security infrastructure.
Take a deep dive into the cryptographic foundation for our Crypto Asset Security Platform (CASP) in this informative talk by world-renowned cryptographer and Unbound Tech’s Chief Scientist, Prof. Yehuda Lindell.

Check out Unbound's newest video on how to protect the cryptographic keys that protect your valuable digital assets. With your crypto keys at the core of your security infrastructure, it is critical to ensure that they are always protected at any given time.

Samuel Ranelluci,  Unbound's Chief Scientist, had the opportunity to attend and speak at the NIST Threshold Cryptography Workshop this year.  
Is it possible to use MPC to compute the outcome with two or more secret inputs from a number of entities while keeping the inputs private?” and more. Prof. Nigel Smart answers the internet’s most asked questions about encryption.
Ever wondered what the difference between public key vs. private key cryptography actually means? Furthermore, why is quantum cryptography even important? Prof. Smart answers all of your questions, and also explains how cryptography has changed in the past five years.
Where is crypto headed? What does this mean for Post-Quantum Cryptography, Privacy and Machine Learning? Prof. Nigel Smart discusses the future of crypto, and explains why the breaking of the Enigma Machine brought the end of WWII much faster.
Will Quantum Key Distribution ever replace Standard Cryptography (as we know it today). Prof. Smart discusses German Lorenz Cipher, which was even more complex than Enigma.
Yao's Millionaire Problem (how to reveal who is the richest millionaire w/out revealing how much money they actually have), in the case of two or more parties. Additionally, what do you do if the message is longer than the keystream? And finally, how and when should one study cryptography?
Do you happen to have a crypto algorithm you'd like to introduce? Then get ready to do a thorough security proof; just because you can't break it, doesn't mean it's secure. Prof. Nigel Smart discusses cryptographic algorithms, applications of multiparty computation, and answers whether we can bioengineer public-key cryptography into human voice.
In this video, Prof. Nigel Smart answers interesting questions whether Multiparty Computation (MPC) can be applied to online dating, how games are used in cryptography incl. system breaking, and if we ever solved the P vs. NP problem, could we replace public key cryptography?
In this video, Prof. Nigel Smart answers whether double layers of encryption make information more secure. What’s the best way to make sure data is protected when one layer can be breached? Prof. Smart answers here!
Prof. Nigel smart answers: What are garbling circuits? What books would you recommend to learn more about cryptography? Is cryptography concerned with worst or average case hardness to solve problems?
Prof. Nigel Smart answers how does multiparty computation work? How does data signing work with public keys and secret keys? And we've all been wondering: Why do you love being a cryptographer and does that make you a good or bad guy?  
Prof. Smart gives an analogy about distributed trust. Why is better to learn classical cryptography vs. quantum key distribution? And the question we’ve all been wondering: Why would an academic cryptography expert start a company?
Prof. Smart answers how cryptographers will deal with Quantum computers that break the hard math which are the foundations of cryptography. Prof. Smart discusses government back-door policies with crypto and why garbled circuits can't be reused.
Unbound received this award for its strides in protecting data and private information in today’s increasingly interconnected digital landscape. At the ceremony, PM Netanyahu highlighted Unbound’s vital contribution of building trust in an untrusted digital world.

Technical Documents

This is where you can find all the technical documents about Unbound Key Control (UKC).
This is where you can find all the technical documents about Unbound Crypto-of-Things (CoT).
This is where you can find all the technical documents about the Unbound Crypto Asset Security Platform (CASP).