Payments Solution.

Reduce the risk of credit card fraud with StrongKey’s easy PCI DSS compliance solution.

While PCI DSS has over 150 controls to secure Card Holder Data (CHD), we focus on the 15 most difficult controls (sections 3.4, 3.5, and 3.6) to make compliance easy. We provide all the needed documentation answering those requirements in our Reference Manual, so you have everything you need to submit an audit document to your Qualified Security Assessor.

GET THE DATA SHEET

WHAT’S INCLUDED.

Tellaro KeyAppliance (KA) enables strong key management and DPAppliance enables large-scale encryption.
Tellaro architecture is built using principles of security by design.
Data security, done right. Straight out of the box.
Since our solutions ensure keys never leave the box, encryption key rotation is automated, and documentation is clear, StrongKey helps make PCI DSS compliance a breeze. 
1 Single-Tenant FIPS Server
FIPS 140-2, levels 2 or 3 certified (TPM or HSM), dedicated server for your encryption needs. No shared tenants and no outsourced keys.  
2 Secure Software Stack
Our software employs the most tested and trusted open-source software platforms to ensure the most up-to-date and advanced security available.
3 Key Management
You choose which dedicated key custodians are given access to your keys and they remain in your control, stored safely on your appliance.  
4 Encryption and Tokenization
The core encryption and tokenization software to provide application layer security.  
5 ANSI x9.24
Derived Unique Key per Transaction (DUKPT) allows end-to-end encryption for “card present” transactions.  
6 Replicator
Replication module provides consistent high availability with active-active clustering.
7 REST and SOAP Web Services API
Encryption APIs made up of simple web services (REST or SOAP) allow applications to call for encryption and tokenization.

StrongKey's staff demonstrates exemplary technical prowess consistently, which enabled the success of one of the most difficult parts of PCI compliance. Their consistent delivery combined with a killer solution is a striking combination, which I strongly recommend.

Sr. Manager, Enterprise Architecture

We engaged with StrongKey to provide PKI services and we could not have found a more knowledgeable, honest and easy to work with partner than StrongKey. From a technical perspective Arshad Noor and his team are well versed with the PKI industry and played a major role in delivering our project on-time. We look forward to our continued relationship with StrongKey.

Sr. IT Project/Program Manager, Telecommunications Firm

StrongKey has guided {us} through the process of building a Public Key Infrastructure. The assistance provided has been invaluable. They patiently answered my questions and helped resolve all technical issues. I recommend StrongKey to anyone considering a PKI for their organization.

System Administrator, Government Services Contractor

The StrongKey appliance is an exceptional product, not just for the money, but in terms of its performance, its flexibility, and future-proof design. There are new privacy rules coming down the pike. This appliance can easily be adapted to other kinds of information that require encryption and protection.

Director of Information Technology

Useful, easy and complete solution for our sensitive data storage requirements. Allow us to reach easily the PCI Certification, reducing the scope of Card Holder Data (CHD).

Chief Technology Officer (CTO) and Chief Security Officer (CSO), Payment Processing Company

FEATURES.

Targeted File Encryption
Verifiable Digital Signatures
Integration to Public Cloud Storage
Strong Authentication Using FIDO-Certified Server
TPM or HSM Hardware
Support

StrongKey provides the highest level of customer support to our clients. Our tiered services can be complemented with on-site installation and training, 24/7 phone support, and more. 

CONTACT US TO LEARN MORE
Open-Source

StrongKey uses, contributes to, produces, and supports open-source technology.

READ MORE ABOUT THIS

OUR APPLIANCES.

StrongKey appliances are deployed on premises or via virtual machine. 

Tellaro E-Series appliances securely process over 1,000 transactions per second.

Tellaro E-Series.

With processing capabilities up to 1,000 transactions per second, the Enterprise solution is your answer to large, complex architectures with scalability for multiple security solutions.

LEARN MORE
Tellaro T100 processes over 100 transactions per second and can store over 100 million encryption keys.

Tellaro T-Series.

A smaller, tabletop device, the Tellaro T can execute up to 100 transactions per second, making it the perfect proof-of-concept or mid-size business solution.

LEARN MORE

OUR APPLIANCES.

StrongKey appliances are deployed on premises or via virtual machine. 

Tellaro servers enable strong authentication, encryption, digital signatures, and key management for your business.

Tellaro E-Series.

With processing capabilities up to 1,000 transactions per second, the Enterprise solution is your answer to large, complex architectures with scalability for multiple security solutions.

LEARN MORE
Tellaro T100 processes over 100 transactions per second and can store over 100 million encryption keys.

Tellaro T-Series.

A smaller, tabletop device, the Tellaro T can execute up to 100 transactions per second, making it the perfect proof-of-concept or mid-size business solution.

LEARN MORE
StrongKey is nation-wide.
West Office | Cupertino, CA
East Office | Durham, NC
CONTACT STRONGKEY