"description":"Nitrokeys protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware and can't be stolen. The device is PIN-protected and is secured against brute force and hardware attacks. Backups protect against loss.",
"description":"Nitrokeys protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware and can't be stolen. The device is PIN-protected and is secured against brute force and hardware attacks. Backups protect against loss.",
"reference_list":[],
"category_list":["Cybersecurity"],
"success_case_list":[{
"similar_solution_list":[{
"title":"Measurement data acquisition in underwater drones",
"title":"Yubico",
"description":"The customer develops underwater drones for military and civilian use. The civilian underwater drones use Nitrokey storage to store measurement data reliably and securely. A special Nitrokey storage with a maximum capacity of 400 GB is used for this purpose. Nitrokey's open source tools allow easy and flexible integration of PIN activation and locking into the underwater drone control system. This ensures that the measurement data remains secure at all times, even if the underwater drone is lost.",
"description":"The client is an internationally operating slot machine manufacturer. To provide the machines with a non-cloneable cryptographic identity, Nitrokey Start is installed. It is used to encrypt sensitive data and program code and to implement secure firmware updates. With Nitrokey Start, security is guaranteed at a reasonable price, even for large volumes.",
"description":"The client is a leading international manufacturer of lighting equipment and offers an open IoT platform for this purpose. All IoT devices on this platform connect via TLS to servers that are authenticated using their X.509 certificates. Since a compromise of these certificates or keys could allow all IoT devices to be compromised, their security is basic. For this reason, several Nitrokey HSMs are used to securely store the corresponding cryptographic keys. By using encrypted key backups of Nitrokey HSMs, a PKI can be implemented in a cost-effective manner, with reliable operation guaranteed for decades.",
"description":"The client is one of the world's leading credit card providers. For PCI DSS-compliant operation, the hard drives of the critical servers are fully encrypted. The keys for this are securely stored in several Nitrokey Pros. These are connected to separate servers and are linked to the critical servers via a specially developed but simple network interface. The entire system is redundantly designed and was developed, deployed and tested in just a few days. Using Nitrokey Pro therefore offers a reliable, secure and cost-effective solution for achieving PCI DSS compliance.",
"description":"NitroPad X230 is significantly more secure than normal computers. With NitroPad, you'll have more control over your hardware than ever before while maintaining ease of use",
"description":"The customer is an internationally operating manufacturer of payment terminals. The payment terminals are produced by one of the world's largest contract computer manufacturers. In the security-critical production process, the NitroPads are used as control computers. For this purpose, NitroPads without WLAN interface and NitroPads with WLAN interface are used specifically where they are needed. This reduces the potential attack surface and significantly increases security.",
"description":"The NitroPC has a current 10th generation Intel Core i7-10510U processor with up to 4.9 GHz and an m.2 SSD with 6 Gb/s, and can thus be used for performance-hungry applications such as programming/compiling and graphics applications. Of course, this also makes it sufficiently equipped for office and web applications.",
"description":"The most secure Android on the planet. The NitroPhone combines security, privacy and ease of use with modern hardware and many years of software updates.",
"description":"NetHSM is the first HSM that is open source, thus offering significant advantages: It is easy to use, easy to customize, and provides superior security. Furthermore its implementation can be audited by anybody to ensure it is free of backdoors. The NetHSM device meets high performance requirements and is available at an unbeatably low price from Germany.",
"description":"With NextBox you get the best of both worlds: The convenience of the cloud and the security and privacy of your own NextBox, located in your home or office. With NextBox, you no longer need to hand over your precious data to anyone anywhere in the cloud. Instead, your data treasures are exactly where they should be: Under your control on your own device with the cloud convenience you're used to.",