
Large-scale Key Management
in a Cloud Environment
KangaLock vHSM
KangaLock vHSM is a paradigm-shifting key management solution. We completely redesigned the traditional HSM from the ground up to overcome its limitations to support new requirements emerging in the era of cloud computing.
- Unparalleled security and reliability in a cloud environment. KangaLock protects sensitive data even in the face of infrastructure, virtual machine, and OS compromise.
- Massive scalability. KangaLock can manage millions to billions of keys and perform cryptographic operations at a high rate. It’s a perfect solution to optimize HSM workloads to respond to change in demand. It can scale out according to the surge and decline in demand.
- Fast and easy deployment and configuration. No need to own special-purpose hardware or hire skilled HSM engineers.

KangaLock vHSM Video
What is the Trusted Execution Environment (TEE)?

KangaLock virtual HSM features strong security powered by the Trusted Execution Environment. TEE is a cutting-edge security technology that dramatically reduces the attack surface down to the CPU. It is resistant against a variety of attacks, including malicious insiders, zero-day exploits, OS vulnerabilities, and even compromised cloud providers or government oversight.

TEE creates a secure area inside the main processor, isolated from the Regular Execution Environment (REE). In the trusted area, only authorized programs can run and access sensitive information.

Any data leaving the TEE will be automatically encrypted by the sealing key hidden inside the CPU. TEE, by design, blocks unwanted data leaks and allows secure execution of critical applications.
Key Features
KangaLock vHSM Applications
KangaLock vHSM serves as a Root of Trust (RoT) and helps you achieve a variety of goals in critical applications, from traditional use cases to emerging applications such as IoT, Blockchain, and V2X.

Usecase
Specifications
Operating System | Linux (Ubuntu, Debian, RHEL, CentOS), Windows |
Interface | PKCS#11 (Supports C, C++, Go, Python, Node.js, OpenSSL) |
Algorithm | RSA, ECDSA, EdDSA, HMAC, SHA-2, AES, Triple DES, ARIA, SEED |
Application | NGINX, Apache HTTP Server, Oracle Database |
Certification | FIPS 140-2 Compliant Algorithm |
Contact Us
Looking for a solution?
TEEware shares your concerns about security. We will continue to research and provide innovative solutions for your security needs. We will be your partner.