Which enhances security through true random number generation and built-in cryptography. The data encryption key is protected by FIPS and Common Criteria validated wrapping algorithms.
Offers ultimate security against hackers, detecting and responding to tampering with features such as:
⋅ Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks
· Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors
· Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection
· Secure Memory Management/Access Protection