The hardware-based YubiHSM 2.2 enables secure key storage and operations by preventing accidental copying and distribution of keys, and by preventing remote theft of keys stored.
Secure key storage and operations on tamper-resistanthardware, with audit logging
Extensive cryptographic capabilities including hashing, key wrapping, asymmetric signing, decryption, attestation and more