Overview
What is Unbound Crypto-of-Things?
Unbound CoT eliminates the single point of compromise by ensuring that sensitive keys that reside on untrusted and insecure devices never exist in the clear at any point in their lifecycle – not even when generated or while in use. With Unbound CoT, key…
Recent Reviews
Leaving a review helps other professionals like you evaluate Encryption Key Management Software
Be the first one in your network to review Unbound Crypto-of-Things, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
Alternatives Pricing
Product Details
- About
- Integrations
- Tech Details
What is Unbound Crypto-of-Things?
Unbound CoT eliminates
the single point of compromise by ensuring that sensitive keys that
reside on untrusted and insecure devices never exist in the clear at any point
in their lifecycle – not even when generated or while in use. With Unbound CoT,
key material is never whole. Rather, each key exists as two random key shares.
All operations are carried out without ever uniting the key shares. By
eliminating the single point of compromise, Unbound CoT provides high
level of security for most sensitive keys such as authentication, signing and
encryption keys – ensuring resistance from cloning or tampering even on
compromised devices.
Unbound Crypto-of-Things Features
- Supported: Security token/hardware token replacement
- Supported: Strong authentication
Unbound Crypto-of-Things Integrations
- OpenSSL
- Microsoft CNG
- PKCS#11
- Java (JCE)
- SAML
- Trusted Platform Module (TPM)
- Intel SGX
Unbound Crypto-of-Things Technical Details
Deployment Types | On-premise |
---|---|
Operating Systems | Windows, Linux, Mac |
Mobile Application | Apple iOS, Android |
Supported Languages | English |