HSM Trustway Proteccio OEM
Hardware Security Module Trustway Proteccio™ OEM makes available to every software editors and system integrators an open and secure hardware platform to customize your own cryptographic appliances.
Porting in the secure boundaries of the HSM TrustWay Proteccio OEM a security application on a Linux operating system has never been so innovative and so easy.

Porting your application
No one Hardware Security Module vendor can cover alone all market needs in the world. Hence, our strategy is to be platform open, a real step furher than merely be platform agnostic, by giving the Editors the possibility to embed their previously server-hosted appliance directly on a cryptographic proven security co-processor evaluated against international certifications.

High Security
Main technical and security benefit that derives from the all-in-one concept developped by Trustway Proteccio is that it greatly simplifies the operating mode of the cryptographic appliance unique to each end customer site. Key business benefit for the Editors leads to a complete mastering of their business model with no interference whatsoever from the HSM vendor.

Scalability
In order to address the spectrum of varied performance and cost requirements, a flexible offer of two variants can be ordered. Still the Editors’ cryptographic appliance delivers the same security-certified cryptographic hardware and firmware.
Certified high security, the Hardware Security Module Trustway Proteccio is designed (hardware and software), implemented and manufactured totally by Bull in France. CC EAL4+ certification covers hardware and software implementation. FIPS 140-2 level 3 is currently in progress.
Virtual HSM, Trustway Proteccio provides a secure platform to embed your software. Your software will benefit of the same environment as the one certified by CC EAL4+ and be tamperproof. Code is signed to guarantee code integrity and to prevent unauthorized code execution. All the sensitive data used by your application are strongly protected by the physical architecture of the Hardware Security Module Trustway Proteccio.
Cryptographic appliance, HSM Trustway Proteccio is the only one to offer the opportunity to propose a cryptographic appliance embedding the whole environment operating system and application. You have a real execution environment (HDD, RAM, MicroChip) with dedicated interface USB and Ethernet. It is possible to deploy your application though only one equipment and simplify its installation into customer environment.
Manageability , Supplied with a user friendly application to administrate, configure and manage HSM (security policy, user rights, key management, SM configuration and updates).
Algorithms
► Asymmetric encryption: RSA
► Symmetric encryption: AES 128 to 256, 3DES
► Digital Signing: RSA PSS, PKCS v1.5, ECDSA
► Hash: MD5, SHA-1, SHA 256, SHA 384, SHA 512
► Supported named curves: ANSI, NIST, ANSSI
Performances
► Asymmetric: Up to 1600 sign/s
► Symmetric: Up to 200Mbits encrypted by second
Interfaces
► Dual Ethernet port for LAN attachement
► 4 x USB ports
Editor’s package
► Editor dev platform (development platform + signature platform)
– HR
– XT
► Appliance (final client)
– HR
– XT
► Additionnal licence virtual HSM
► Additionnal batch of cards
Related resources and news
Factsheet Trustway Proteccio OEM
Build your own Cryptographic Appliance
HSM Trustway Proteccio OEM makes available to editors and integrators an open and secure hardware platform open for the design of certified and ongoing cryptographic appliances…
Brochure HSM
Data Security – Choosing the right path through compliance
Compliant, flexible and innovative, our Hardware Security Module range brings to companies and critical infrastructures the reliability of an innovative and robust architecture in compliance with strict security demands.
Brochure GDPR
Download: GDPR Encryption, the key for data protection
Discover how Trustway’s portfolio gives organisations navigating GDPR the tools they need to solve these challenges according to the shape of their operations and their IT architecture.
Partner program
Partnership cyber security products
Bull support consists of an international team of experts who will help you get optimal use out of our products in your specific environment every day.