• YubiHSM 2 and YubiHSM 2 FIPS

    Game changing cryptographic protection for servers, applications and computing devices.
    Download product briefDownload product brief Asymmetric cryptography and Bring Your Own Key (BYOK)Asymmetric cryptography and Bring Your Own Key (BYOK)
    Home » Products » YubiHSM 2 and YubiHSM 2 FIPS

    Not your traditional HSM

    The world’s smallest HSM secures modern infrastructures other traditional HSMs with a bigger footprint simply can’t

    Enhanced protection for
    cryptographic keys

    Secure generation, storage and management of digital keys.

    Rapid integration with hardware-backed security

    A comprehensive cryptographic open source toolbox with support for PKCS#11.

    Simplified deployment for organizations of all sizes

    Ultra portable form factor at an affordable price secures a wide range of long-standing and emerging use cases.


    Is the YubiHSM 2 or YubiHSM 2 FIPS right for you?
    Do you need to secure your manufacturing process / supply chain?Yes
    Do you want to secure your software development process?Yes
    Do you need to secure your crypto currency environment?Yes
    Are you looking for an HSM that’s more cost effective than a traditional HSM?Yes
    Are you looking for an HSM that is compact and highly portable?Yes
    Looking for a FIPS 140-2 validated HSM? You may prefer the YubiHSM 2 FIPS
    Buy now

    YubiHSM 2 and YubiHSM 2 FIPS Key capabilities

    YubiHSM 2 and YubiHSM 2 FIPS highlights:

    Game changing cryptographic protection for servers, applications and computing devices.

    • Portable nano form factor with low-power usage
    • Secure key storage and crypto operations on a tamper-resistant device
    • Network shareable for use by applications on other servers
    • Interfaces via YubiHSM KSP, PKCS #11 and native libraries
    • Direct USB support beneficial for virtualized environments
    • IP68 rated, crush resistant, no batteries required, no moving parts
    • Enhanced control over multi-cloud security with Bring Your Own Key (BYOK) functionality

    Read the YubiHSM 2 and YubiHSM 2 FIPS product brief >


    Buy nowBuy now

    Contact usContact us

    Enhanced protection for cryptographic keys
    • Improve key management by preventing the local copying and distribution of cryptographic keys
    • Defend against remote attacks and eliminate remote extraction of private keys by storing cryptographic keys securely on hardware
    • Strong hardware-based security ensures the highest bar for protection of sensitive information and data
    • Experience even stronger security with the ability to store YubiHSM 2 authentication keys on a YubiKey, to eliminate yet another password
    • Asymmetric cryptography for wrapping of sensitive data for backups ensures no secrets are exposed even if wrapped data is sent over the internet to another location
    Buy nowBuy now

    Rapid integration with hardware-backed security
    • Open source SDK enables rapid integration
    • Frees developers to easily build support for hardware-based strong security into a wide array of platforms, applications and services
    • Enables organizations to easily make the YubiHSM 2 features accessible through industry standard PKCS#11
    Buy nowBuy now

    Simplified deployment for organizations of all sizes
    • Ultra-portable and fits easily into a front USB slot on computers and servers
    • Secures modern use cases such as cryptocurrency exchanges, IoT gateways and proxies and cloud services
    • Secures Microsoft Entra ID certificates

    Secure your manufacturing and supply chain operations


    Looking to enhance security for the following areas?
    The YubiHSM 2 can help.
    Are you looking to secure your PKI environment, including protecting your certificate authority (CA)? Yes
    Are you looking to encrypt your files or databases?Yes
    Do you need to sign code or any digital artifact, such as firmware or an element embedded on an electronic device?Yes
    Looking for a FIPS 140-2 validated HSM? You may prefer the YubiHSM 2 FIPS
    Buy now I Download deployment documentation

    Learn how YubiHSM 2 safeguards corporate secrets and secure manufacturing

    Read this white paper to learn how manufacturing companies can protect supply chains and intellectual property with the YubiHSM.

    Read nowRead now

    YubiKey protects the world’s leading brands

    logo garden
    See more customersSee more customers

    Get Started

    Learn about the HSM

    Contact our sales team for a personalized assessment of your company’s needs.

    Contact salesContact sales
    Get protected today

    Browse our online store today and buy the right YubiKey for you.

    Buy nowBuy now

    Already have YubiHSM? Visit our support page for deployment guides and practical implementation considerations