vSEC:ID Server Key - SW HSM
vSEC:ID Server Key server applications can quickly and cost effectively be upgraded to use hardware protected keys instead of file based keys. vSEC:ID Server Key provides similar level of security as an HSM (Hardware Security Module) at a cost more comparable to file based keys.
A typical use case for the vSEC:ID Server Key is a Certificate Authority. A certificate authority has very high security requirements for its root key. vSEC:ID Server Key enables the CA to use normal smart cards to secure the keys.
Version 1.1 is Here!
vSEC:ID Server Key version 1.1 is now available for download and evaluation. Click here to register
Product Sheet
Download the product sheet for vSEC:ID Server Key here and learn about how vSEC:ID Server Key can be used to secure your server applications. [pdf]
License Registration
You can register your vSEC:ID Server Key directly by clicking the ‘Request License Online’ button (found on the ‘Tools’ tab in the administration application).
vSEC:CMS
Our product suite provides all the software tools to administrate and manage credentials in a secure and convenient way.
Free Product Trial
Versasec provides enabling IT security products centered on the usage of security devices such as smart cards. Our solutions enable customers to securely authenticate, issue and manage user credentials more cost effectively. Get a free product trial.
Job Openings
We are always looking for new exceptional persons to join our team! Find out more about our job openings.
New to credential management?
SCMS = Smart Card Management Systems
CMS = Credential Management System
Have a look at the Wikipedia definition of a ‘Smart Card Management System’.
Versasec Support
Versasec customers with an existing support and maintenance contract can access the Versasec Support Portal, offering extensive professional support and maintenance services. The Versasec Support Portal offers a variety of services, allowing for customers and any site visitor to communicate directly with support engineers.
Company Blog
Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger role in keeping corporate data safe as well as brand reputations intact.