Unbound vHSM Technology

(Virtual Hardware Security Module)

Unbound vHSM technology is the first to provide mathematically-guaranteed protection for cryptographic keys and secrets with a pure-software solution that runs on any endpoint, server or cloud, at a security level comparable with physical HSMs.  Unbound safeguards keys and secrets at all times, ensuring that they are never exposed throughout their entire lifecycle.


Mathematical Guarantees of Security

Unbound completely eliminates the single point of compromise for your most sensitive assets, ensuring keys and secrets are never kept whole. Unbound implements MPC to create and use the fragmented secret without ever unifying it, in a method mathematically proven to be impossible to a breach or hack of any single location.

How Does It Work

Unbound vHSM generates a split key and keeps refreshing the split. The key exists as two separate random shares stored in different locations. Each random share alone reveals no information whatsoever about the actual key.

Line 1 Tech page
Tech page line 2

The key’s shares are stored in different machines that are strongly segregated, for example between different clouds, in a hybrid-cloud constellation or between endpoint device and a server, to ensure the utmost security. Key shares are never combined at any point in time: all operations are carried out without ever uniting the key shares.

Unbound secures assets beyond physical confines. It stretches the boundary of traditional security by ensuring a key never exists in the clear throughout its lifecycle – not even when it’s being created or used.

The Benefits of vHSM Technology

Achieves Hardware-Level Security

Fortified by Secure Multiparty Computation (MPC), Unbound vHSM technology enables software to provide hardware-grade security

Performs All Standard Crypto-Operations

Supports every service you expect from a physical HSM & more, including: doc signing, certificate signing, code signing, app-level encryption, encryption/decryption, authentication, PKI infrastructure & VPN gateways

Accelerates Digital Innovation

Enterprises are free to grow and fast-track their digital initiatives without settling for anything but the highest level of security

Supports Multi-Site, Multi-Cloud, Hybrid Environments

Unbound vHSM supports the full integration of all workloads – on-premises and all cloud environments – so there’s no need to manage keys in silos.

Multi-Party Computation
The Math that Powers Us

Unbound technology delivers the first enterprise-grade applications of Multi-Party Computation (MPC) to ensure superior secret protection, at a level once only possible with hardware.


MPC in a Nutshell

MPC in a Nutshell

Cryptographers first developed Multi-Party Computation in the 1980s as a way to allow mutually distrustful parties to perform a joint computation on their individual inputs without having to reveal their data to one another.


From Theory to Practice: Breaking the Boundaries of Hardware

From Theory to Practice: Breaking the Boundaries of Hardware

Unbound Co-founders Prof. Yehuda Lindell and Prof. Nigel Smart are regarded to be among the world’s top minds in Multi-Party Computation. They created Unbound to capitalize on the strength of MPC and to form disruptive software solutions that pose powerful alternatives to hardware for protecting secrets and enabling trust-contingent scenarios.

Privacy: The Next Leg of the MPC Revolution

Unbound’s ongoing research into Multi-Party Computation is revealing exciting opportunities in the privacy arena, posing scenarios hereto unexplored but that inevitably will prove critical to future technology.

Can MPC process data without decrypting it, making it possible to work entirely in the cloud without losing control of data? Are there new ways MPC can help organizations collaborate and perform joint computations on each of their individual data without revealing it to one another? As the global leader in industry-grade MPC solutions, Unbound is developing the solutions to meet these challenges.

See what leading analysts say about MPC:

 Multiparty computing shows potential as a method of cryptography that can allow people, devices and apps to work with data while keeping the data in a protected, confidential state 

Push Your Boundaries:
Elastic, Scalable & Agile Crypto Infrastructure

MPC Primer

Get an in-depth explanation of how Unbound uses MPC, a mathematically proven method to secure keys on any device.

( Download )

How to Go Beyond BYOK with CYOK

Control Your Own Keys in the Cloud (CYOK) can ensure your sensitive assets remain secure even in the event of a breach.

( Watch )

Unbound Key Control

Learn how Unbound Key Control, the first secure-as-hardware key management system can protect your crypto keys anywhere.

( Download )

Securing Data in Multi-Cloud Environments

Learn more about how two major banks are using Unbound to reinvent data reinvent data protection in the Digital Banking age.

( Watch )