top of page

WORKS WITH FIDO2 & U2F

FIPS miniHSM Token

Google, Microsoft, Salesforce, Amazon Web Services, etc.

K40_540x.png

Cryptographic Keys Stored in Software are Vulnerable to Threats.

The cost of cybercrime is projected to exceed $8 trillion by 2024. As attacks become more sophisticated, the storage of cryptographic keys for servers is increasingly vulnerable. If a private key from a Certificate Authority (CA) is compromised, an attacker can impersonate your website.

Crypto Shield

The cryptocurrency market is expanding quickly, and its high volume of assets requires protection against emerging security risk. Many exchanges have been breached, which could have been avoided if a hardware security module had been used as a best practice security approach. Developers can quickly integrate jNet's SDK to safeguard cryptographic keys and sensitive financial information when creating solutions for cryptocurrency exchanges.

Security Integration

Developers can integrate hardware security modules to protect sensitive financial information and cryptographic keys for cryptocurrency exchanges. A best practices security approach could have prevented previous breaches. Cloud security is important. An HSM can be used in a data center as part of a cloud infrastructure to provide extra security for data. This can give organizations peace of mind when using cloud hosting services.

Certificate Security

Secure Microsoft Active Directory Certificate Services: The HSM solution can provide hardware-backed keys for an organization’s Microsoft-based PKI implementation. Deploying the HSM to the Microsoft Active Directory Certificate services not only protects the Certificate Authority's private keys but also protects all signing and verification services using the private key.

The FIPS 140-3 validated mini-HSM will secure your credentials

Ensure secure hardware cryptographic key storage and operations for applications, servers, and computing devices while eliminating the cost and complexity of traditional Hardware Security Modules (HSM)s. jNet HSM solutions are tamper-resistant and offer low-cost, high-security ROI in a compact form factor that allows flexible use across diverse devices and locations. With the jNet mini-HSM, firms can prevent cryptographic keys from being copied by attackers, malware, and malicious insiders. Enterprises can rapidly integrate with jNet’s mini-HSM devices using the open-source SDK 2.0.

hand-holding-closed-padlock.jpg

ULTIMATE KEY PROTECTION

Protect your cryptographic keys with the world’s smallest, most secure HSM

The jNet mini-HSM is a FIPS 140-3 certified Level 3 Hardware Security Module that provides cost-effective cryptographic hardware security for applications, servers, and computing devices in a compact form.

  • Integrated multi-protocol security USB/NFC fob, designed to eliminate account takeovers with strong two-factor, multi-factor and passwordless authentication, and seamless touch-to-sign. 

  • Multi-protocol support allows for strong security for legacy and modern environments such as FIDO2, U2F, Smart card, OTP, OpenPGP 3 applications.

  • USB-A, USB-C, NFC, Lightning contactless protocols.

  • IP68 rated, crush resistant, no batteries required, no moving parts.

With the jNet’s SDK for its mini-HSM, developers can rapidly integrate support for the FIPS 140-3 HSM module into business products and applications with capabilities like generating and importing keys, signing and verification, and data encryption and decryption. Developers can also make these features accessible through industry standard PKCS#11.

Cryptographic keys stored in software are vulnerable to copying, accidental distribution, and remote theft. Admins or malicious insiders can easily back up keys to USB flash drives, FTP them, or share them via a cloud storage service. Sophisticated attackers can also gain admin access or deploy trojan malware to search for and copy keys for sale on dark websites.

The jNet's FIPS-certified HSM solution provides secure key storage and extensive cryptographic capabilities, including hashing, key wrapping, asymmetric signing, decryption, and attestation. It also prevents accidental copying and distribution of keys and ensures that internally generated keys are not exposed outside the security boundary. The mini-HSM features audit logging and tamper-resistant hardware.

Open-source libraries

Custom application support using open-source libraries. Interfaces via jNet miniHSM KSP, PKCS#11, and native libraries.

Management

Remote management reduces management complexity and costs.

Flexible X

Various security options 

cloud-online-data-icon-computer-keyboard.jpg
resul-mentes-DbwYNr8RPbg-unsplash-min.jpg

Innovative Design for Flexible Use

Most enterprises find traditional rack-mounted and card-based HSMs impractical due to size and deployment complexity. jNet’s mini-HSM is a flexible solution for securing servers, applications, databases, assembly lines, IoT devices, cryptocurrency exchanges, and more. The jNet mini-HSM easily fits into a USB slot and accommodates physical security enclosures.

K40_540x_edited.png
adapter.png
Form factor

Compact’ form factor enables flexible deployment and use across devices and locations.

link.png
USB-A port

Fully concealed USB-A port deployment.

turn.png
Flexibility X

Authenticate anywhere without power and network connectivity.

touch.png
Network

Network shareable for use by applications on other servers.

external-hard-drive.png
Portable X

Slim and lightweight companion with key ring for everyday access wherever you need it.

insurance.png
Security X

Uses public and private key cryptography, HOTP (Event), Smartcard (PIV-compatible), OpenSC-compatible

jNet OpenKey

The mini-HSM allows organizations to increase cryptographic key security, reduce risk, and ensure compliance. The jNet SDK 2.0 is open source, making it easy to integrate support for the HSM into a variety of systems.

51.5 x 18.5 x 6mm

Black thermoplastic polyamide (PA) with matte finish

Rear Touch sensor, keychain hole
Water resistant, robust construction



 

bottom of page