SAM Appliance

SAM Appliance is a solution for all-in-one data encryption, digital signature authentication and mobile identification on HSM Cloud platform, ensuring compliance with standards for remote digital signature, blockchain, crypto currency, mobile payment, data encryption, transaction encryption, timestamp, security, system authentication,…

Suitable for all sizes of businesses

SAM Appliance with
Internal HSM - nShield Solo PCIe

Suitable for: Businesses using a digital signature system for the first time or for testing systems, with reasonable initial investment costs.
Components
– FIPS 140-2 Level 2 & Level 3 Protection and eIDAS Common Criteria
– HSM nShield Solo PCIe inside
– SAM Software – using Entrust SAM/HSK
– Signing Software (SAVIS): RAS Service, HSM Signing/Remote Signing, Verification, CA, RA, Digital Signature, Encryption…
– Mobile App/SDK (SCAL1, SCAL2), Server SDK (Java, .Net,,…), RestAPI. Support Timestamp & AdES Signature”

SAM Appliance with
External Network HSM - nShield Network HSM

Suitable for: Medium to large-scale businesses with significant, complex digital signature needs, requiring a systematic and rigorous process automation.
Components
– FIPS 140-2 Level 2 & Level 3 Protection and eIDAS Common Criteria
– HSM nShield Network
– SAM Software – using Entrust SAM/HSK
– Signing Software (SAVIS): RAS Service, Remote Signing, IAM, Verification, CA, RA, Digital Signature, Encryption…
– Mobile App/SDK (SCAL1, SCAL2), Server SDK (Java, .Net,,…), RestAPI. Support Timestamp & AdES Signature

Outstanding advantages of SAM Appliance

Full compliance with international standards

Features

Electronic Identification

Verify user identities in applications, ensuring reliability, accuracy, and security for electronic transactions, while complying with state and European eIDAS regulations.

Secure Digital Signatures

Support advanced signature standards such as ISO 17090 standards like CadES, PadES, XadES, as well as LTV and LTANS standards for electronic storage and authentication.

Blockchain/Cryptocurrency

Manage keys and generate digital signatures within the blockchain system, ensuring authentication, safety, and security for all data and digital assets/cryptocurrencies.

Mobile Payment/Digital Wallet

Integrate with electronic transaction systems and e-wallets to ensure secure online payment transactions with authentication, management, and digital signature generation.

PKI In A Box

Deploy a public key infrastructure (PKI) infrastructure, packaged in a hardware device, to meet the need for building a specialized internal public infrastructure.

Data Encryption - Transaction Encryption

Encrypt data and transactions, ensuring that all information cannot be stolen or tampered with during initiation, storage, and transmission.

Timestamping

Apply timestamping to data and documents to establish evidence and authenticate the existence of data at a specific point in time.

Electronic Storage

Have the ability to integrate with long-term electronic storage systems, allowing high-quality document storage for 10 years, 20 years, 50 years, or indefinitely.

System Authentication and Security

Apply timestamping to data and documents to establish evidence and authenticate the existence of data at a specific point in time.

Dynamic Workflow and System Integration

Initiate, review, and digitally sign documents from mobile devices such as laptops, tablets, and mobile phones.

Connect with an expert

Fill out the form to have one of our experts contact you