Hub Security launches new HSM crypto custody solution

Hub Security is an evolved, protection force-grade supplier of programmable HSM and key administration solutions for fintech, AI capabilities, cloud, and blockchain security…

Published by



Hub Security, an Israeli cybersecurity firm manufacturing hardware modules for stable custody of non-public keys, paired with an extremely-stable quantum-proof HSM cloud platform, nowadays introduced the start of their unusual stable custody resolution geared in opposition to the Decentralized Finance (DeFi) sector.

The unusual carrier permits DeFi groups to securely join between MetaMask and Ethereum, as smartly as most other standard global DeFi platforms. The unusual carrier would provide organizations with cease-to-cease cyber security for their MetaMask crypto wallets interior a rugged hardware ambiance the use of Hub Security’s stable platform.

Andrey Iaremenko, CTO & Co-Founder at HUB Security

“The growing use of DeFi has led to a sleuth of unusual DeFi capabilities that allow the performance of advanced monetary transactions equivalent to flash loans, decentralized exchanges, and intricate monetary hedging on the Ethereum blockchain. As of nowadays, more than $41 billion price of assets are already locked in a great deal of DeFi apps, and the number is easiest increasing,” says Hub Security CTO and co-founder, Andrey Iaremenko.

“At the linked time, billion-buck apps easiest allow advanced transactions by person-oriented solutions like Ledger or Trezor wallets, which would be unable to produce entire cyber security. Which capability, monetary transactions infrequently can’t be wisely validated as stable, growing a bother the keep hacking exercise can thrive.”

HUB’s New Solution

Hub Security’s unusual resolution will now allow organizations to manipulate and protect the exercise of monetary transactions, as smartly as shipshape contracts before they’d also simply even be processed. “In talk in self assurance to alter to recent law, a person must aloof be ready to see beefy information of a transaction — at the side of the amount, receiver, and contract. But the market solutions available nowadays are easiest ready to produce customers with a transaction’s hash, a string of letters and number on a 1 cm cover, to approve. Hub Security’s resolution combines the cybersecurity of an HSM with a determined presentation of the transaction information, which permits monetary institution-level security,” explains Mr. Iaremenko.

In addition, encrypted keys are saved and safeguarded on Hub Security’s stable a ways-off servers the keep customers can develop bizarre and intricate person-privilege architectures that may per chance per chance allow several signatories to approve high-level transactions straight away. Moreover, Hub Security’s platform leverages AI technology that can be taught to foretell the transaction patterns of customers and prevent suspicious exercise.

The resolution’s technology is per the corporate’s bizarre cybersecurity capabilities, which leverages Hub Security’s extremely-stable Vault HSM (Hardware Security Module) system and key administration platform. The resolution consists of a a ways-off server that mixes serious bodily and community security traits to allow for the stable use of encryption keys and other extremely-sensitive data. The server may per chance per chance also simply even be accessed by customers by technique of a stable mini-HSM system that is offered by the corporate and serves as an on-the-dash a ways-off controller. In addition to offering utilization flexibility, the handheld system is bundled with dedicated tool that offers two-tier (2FA) monetary institution-level security and person authentication.

Hub Security utilizes protection force-grade cybersecurity principles for its Vault HSM (Hardware Security Module) and handheld mini-HSM devices. With FIPS-permitted cryptographic algorithm validation, as smartly as a security structure designed for FIPS 140-2 Stage 4 (pending), Hub’s resolution is poised to produce the stymied DeFi sector with the ultimate-level of cybersecurity security available available on the market to this point.

Leave a comment