{"id":4078,"date":"2021-01-19T15:52:59","date_gmt":"2021-01-19T13:52:59","guid":{"rendered":"https:\/\/www.epikshare.com\/blog\/news\/overview-what-hardware-security-modules-do-for-data-encryption\/"},"modified":"2021-01-19T15:53:00","modified_gmt":"2021-01-19T13:53:00","slug":"overview-what-hardware-security-modules-do-for-data-encryption","status":"publish","type":"post","link":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/","title":{"rendered":"Overview: What hardware security modules do for data encryption"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4078\" class=\"elementor elementor-4078 elementor-4070\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3da896d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3da896d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32f0fc6\" data-id=\"32f0fc6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c49730 elementor-widget elementor-widget-text-editor\" data-id=\"2c49730\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>It is not only in a high-security context that the protection of sensitive data is paramount. If you want to be on the safe side when dealing with cryptographic keys and application environments, you should rely on so-called hardware security modules (HSM). In the blog, we reveal the advantages of this and what you should look out for.<\/strong><\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d309a42 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d309a42\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9fa5ddc\" data-id=\"9fa5ddc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-776b478 elementor-widget elementor-widget-text-editor\" data-id=\"776b478\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The current trend toward remote work and home offices is one of the major challenges companies face in the field of data security. The appropriate encryption is essential here. Only encryption can provide reliable protection against data theft and espionage or compromised data &#8211; but the keys must be managed absolutely securely. This is where hardware security modules (HSMs) come into play. HSMs are standalone devices that can perform a variety of cryptographic operations. Depending on the type, they serve different purposes. For example, they are often used to generate and store keys, but they are also used to provide signing and encryption algorithms. They provide high-performance cryptographic services for enterprise applications and ensure data integrity for business-critical processes. Often, the modules are plug-in cards, NFC tokens, or smart cards that allow secured devices to connect to the host. However, network appliances or server variants that can be activated directly via TCP\/IP and thus connected to the network are not uncommon, especially in data centers.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6df63eb elementor-widget elementor-widget-heading\" data-id=\"6df63eb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Where are HSMs used?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aff4970 elementor-widget elementor-widget-text-editor\" data-id=\"aff4970\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The range of applications for hardware security modules is enormous. The devices are used wherever personal data needs to be protected to a particularly high degree or where flawless digital identification is required. For example, they are included in security tokens and smart cards, are built into cryptographic transaction systems in banks (e.g., in ATMs) and SSL servers, or we also encounter them in everyday work in key certification and time stamp systems.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c54e78 elementor-widget elementor-widget-heading\" data-id=\"3c54e78\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the advantages of HSM?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fc2342 elementor-widget elementor-widget-text-editor\" data-id=\"8fc2342\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The entire cryptographic lifecycle of a key takes place in the hardware security module &#8211; from generation to management and storage to ultimate deletion. Logging of all interactions provides a detailed audit trail to which companies can refer. But not only cryptographic keys can be managed with an HSM: it is also possible to generate and process digital signatures or secure entire application environments.<br \/>\nAnother advantage is that only authorized persons have access to the devices. This means that all cryptographic keys remain protected from unauthorized access. They also have various signing and encryption algorithms such as AES, DES or IDEA for generating new keys. Whereas software-based storage of cryptographic keys is not subject to any standards and thus always involves certain security risks, in the case of hardware security modules the keys never leave the physical devices in an unprotected form. HSMs thus contribute significantly to the data protection efforts of companies and increase security enormously.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c0772b elementor-widget elementor-widget-heading\" data-id=\"1c0772b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What should HSMs do?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0683c07 elementor-widget elementor-widget-text-editor\" data-id=\"0683c07\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Depending on the area of application, companies place different demands on hardware security modules. However, there are some essential requirements that such a module must fulfill, which go beyond the secure execution of common cryptographic functions. For example, the device must not only secure the cryptographic application environment in the company, but also protect the software environment against manipulation and the import of third-party programs. In addition, all keys must also be reliably protected against attacks on the module&#8217;s hardware (so-called &#8220;tamper resistance&#8221;). Companies must also pay attention to this when selecting a suitable HSM. It should also be ensured that the risk of a side-channel attack is as low as possible.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83ab04 elementor-widget elementor-widget-heading\" data-id=\"c83ab04\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Securely encrypted data is the be-all and end-all<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb284a6 elementor-widget elementor-widget-text-editor\" data-id=\"cb284a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ultimately, hardware security modules are just another important component in a company&#8217;s security concept. Not only due to legal regulations such as the DSGVO, but above all to secure their own business success, responsible handling of their own data is essential for companies. Hardware security modules can make an important contribution to this, and with solutions such as the epiKshare Suite, they can even be integrated into file sharing processes for authentication purposes. This means that files are not only securely encrypted, but can also be shared with third parties without hesitation. More information about data encryption with epiKshare can be found here.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>It is not only in a high-security context that the protection of sensitive data is paramount. If you want to be on the safe side when dealing with cryptographic keys and application environments, you should rely on so-called hardware security modules (HSM). In this blog, we reveal the advantages of this and what you should look out for.<\/p>\n","protected":false},"author":4,"featured_media":4073,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-4078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-professional-article"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.4 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Overview: What hardware security modules do for data encryption - epiKshare<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overview: What hardware security modules do for data encryption\" \/>\n<meta property=\"og:description\" content=\"It is not only in a high-security context that the protection of sensitive data is paramount. If you want to be on the safe side when dealing with cryptographic keys and application environments, you should rely on so-called hardware security modules (HSM). In this blog, we reveal the advantages of this and what you should look out for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"epiKshare\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-19T13:52:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-19T13:53:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Niko Berger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Niko Berger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/\"},\"author\":{\"name\":\"Niko Berger\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/28884ca1644aa677993bf2a9733a316e\"},\"headline\":\"Overview: What hardware security modules do for data encryption\",\"datePublished\":\"2021-01-19T13:52:59+00:00\",\"dateModified\":\"2021-01-19T13:53:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/\"},\"wordCount\":703,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg\",\"articleSection\":[\"Professional Article\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/\",\"url\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/\",\"name\":\"Overview: What hardware security modules do for data encryption - epiKshare\",\"isPartOf\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg\",\"datePublished\":\"2021-01-19T13:52:59+00:00\",\"dateModified\":\"2021-01-19T13:53:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#primaryimage\",\"url\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg\",\"contentUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.epikshare.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Overview: What hardware security modules do for data encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#website\",\"url\":\"https:\/\/www.epikshare.com\/en\/\",\"name\":\"epiKshare\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.epikshare.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#organization\",\"name\":\"epiKshare GmbH\",\"url\":\"https:\/\/www.epikshare.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/logo_epik_2.png\",\"contentUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/logo_epik_2.png\",\"width\":222,\"height\":50,\"caption\":\"epiKshare GmbH\"},\"image\":{\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/28884ca1644aa677993bf2a9733a316e\",\"name\":\"Niko Berger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/Niko_Portrait-150x150.jpg\",\"contentUrl\":\"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/Niko_Portrait-150x150.jpg\",\"caption\":\"Niko Berger\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Overview: What hardware security modules do for data encryption - epiKshare","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Overview: What hardware security modules do for data encryption","og_description":"It is not only in a high-security context that the protection of sensitive data is paramount. If you want to be on the safe side when dealing with cryptographic keys and application environments, you should rely on so-called hardware security modules (HSM). In this blog, we reveal the advantages of this and what you should look out for.","og_url":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/","og_site_name":"epiKshare","article_published_time":"2021-01-19T13:52:59+00:00","article_modified_time":"2021-01-19T13:53:00+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg","type":"image\/jpeg"}],"author":"Niko Berger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Niko Berger","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#article","isPartOf":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/"},"author":{"name":"Niko Berger","@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/28884ca1644aa677993bf2a9733a316e"},"headline":"Overview: What hardware security modules do for data encryption","datePublished":"2021-01-19T13:52:59+00:00","dateModified":"2021-01-19T13:53:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/"},"wordCount":703,"commentCount":0,"publisher":{"@id":"https:\/\/www.epikshare.com\/en\/#organization"},"image":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg","articleSection":["Professional Article"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/","url":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/","name":"Overview: What hardware security modules do for data encryption - epiKshare","isPartOf":{"@id":"https:\/\/www.epikshare.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg","datePublished":"2021-01-19T13:52:59+00:00","dateModified":"2021-01-19T13:53:00+00:00","breadcrumb":{"@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#primaryimage","url":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg","contentUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2021\/01\/epiKshare_Hardware_Sicherheitsmodule_rev2.jpg","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.epikshare.com\/en\/blog\/professional-article\/overview-what-hardware-security-modules-do-for-data-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.epikshare.com\/en\/"},{"@type":"ListItem","position":2,"name":"Overview: What hardware security modules do for data encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.epikshare.com\/en\/#website","url":"https:\/\/www.epikshare.com\/en\/","name":"epiKshare","description":"","publisher":{"@id":"https:\/\/www.epikshare.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.epikshare.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.epikshare.com\/en\/#organization","name":"epiKshare GmbH","url":"https:\/\/www.epikshare.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/logo_epik_2.png","contentUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/logo_epik_2.png","width":222,"height":50,"caption":"epiKshare GmbH"},"image":{"@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/28884ca1644aa677993bf2a9733a316e","name":"Niko Berger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.epikshare.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/Niko_Portrait-150x150.jpg","contentUrl":"https:\/\/www.epikshare.com\/wp-content\/uploads\/2020\/03\/Niko_Portrait-150x150.jpg","caption":"Niko Berger"}}]}},"_links":{"self":[{"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/posts\/4078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/comments?post=4078"}],"version-history":[{"count":0,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/posts\/4078\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/media\/4073"}],"wp:attachment":[{"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/media?parent=4078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/categories?post=4078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.epikshare.com\/en\/wp-json\/wp\/v2\/tags?post=4078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}