tech-hero

A Disruptive Technology Built by an Outstanding Team

Unbound applies technology breakthroughs in secure multiparty computation (MPC), along with decades of enterprise security experience, to create cryptography solutions designed for the digital business.

Show me how

Transforming Trust

Today, security leaders often face a tough reality: either centralize protection of sensitive cryptographic keys within rigid, purpose-built hardware devices or allow flexible key storage and use at high risk.

Unbound transforms this reality. We enable a distributed model of trust based on splitting keys into separated shares that are never combined, managed in a pure-software platform that can be deployed flexibly and quickly on any infrastructure.

How Does it Work?

1
Split
Each key is generated as multiple random shares that are constantly refreshed. Each share alone reveals no information whatsoever about the actual key, ensuring there is no single point of compromise.
2
Store
The key’s shares are stored in different machines that are strongly segregated, for example between different clouds or between an endpoint device and a server, to ensure the utmost security.
3
Secure
Unbound stretches the boundary of traditional security by ensuring a key never exists in the clear throughout its lifecycle – not even when it’s being created or used. Using MPC technology, all key operations are carried out without ever uniting the shares.
1split
2store
3secure

Distributed Trust Platform

Architecting Cryptography for Security and Speed

Unbound lets you build an enterprise-wide cryptography architecture designed for the digital era.

Starting with a foundation of MPC-based virtual secure key stores for any on-premises or cloud server (virtual HSM) or endpoint (virtual secure enclave), topped with a unified key management platform serving multiple key stores and enterprise security applications, Unbound provides your business with the agility, flexibility and efficiency it needs to grow​.

Unbound Platform Diagram

MPC from Backstage to Centerstage

Unbound’s technology is built on secure multiparty computation (MPC) – a field of cryptography that enables parties to compute over data across multiple machines without ever revealing the data.

Developed over decades of academic research, today MPC is a mature technology that can be used to carry out privacy-preserving computations in practice. It is being used to solve important security problems in modern zero-trust computing environments, such as key protection, and secure computation on always-encrypted data in the cloud.

Learn More

Cryptographic Key Management Trends in 2020

In this survey, Unbound Tech and the Cyber Security Competency Group (CSCG) examine cryptographic key management practices across multiple sectors – and uncovers the truth about KM practices for enterprise in 202...

A Basic Introduction to Secure Multi-Party Computation (SMPC)

Confused over MPC and what it means for cryptographic key protection in the enterprise? Learn straight from the experts with our new guide. A Basic Introduction to Secure Multiparty Computation (SMPC) is authored by...

FIPS 140-2 Certification Levels: Security and Compliance Considerations

FIPS 140-2 certification provides vital assurance that cryptographic modules meet industry-accepted standards for protecting keys. Digital transformation has intensified the threat landscape across all networks and ...
Your Cryptographic Security Setup

Is Your Cryptographic Security Setup Holding You Back?

Imagine a scenario where data is kept on hard drives or disks you own, phones can only… well… make phone calls (or send simple text messages), and currency is only of the traditional fiat kind. Welcome to 19...
The Cost of Doing Nothing

Securing Identity: The Cost of Doing Nothing

The old adage of “why do robbers target banks? Because that’s where the money is,” has never rung truer as it does today when we consider the increase in security attacks designed to gain access to identity ...
Encryption and Regulation

Encryption & Regulation

How Do I Encrypt Thee? Let Me Count the Ways In our recent blog post on NY-DFS compliance requirements, we discussed the significant role of encryption as a means for financial institutions to implement security ...
video-math-over-matter-webinar-light-400

How to protect your valuable digital assets In a zero trust environment?

Protecting valuable digital assets in zero trust environment. The mechanism behind the model of trust that eliminates the single point of compromise.
video-vhsmwebinar-light-400

How our pure software solution works

For those of you wanting to see exactly everything you can do in the Unbound NextGen vHSM® Interactive Demo, we’ve prepared this video tutorial that gives you a behind the scenes look.
video-casp-webinar-light-400

Digital assets: Security with speed and efficiency

Organizations are protecting clients’ digital assets by enabling easy to operate and automate transactions solution.

Unbound Products

UKC
UnboundKeyControl
CASP
Crypto Asset Security Platform
CoT
Crypto- of- Things

Finally, a Fresh Approach to Cryptographic Keys

Book a demo
CTA-technology