Company:HP Atalla

From HandWiki
Atalla
TypePrivately owned
IndustryComputer software, Enterprise software, Encryption
Headquarters
Sunnyvale, California
,
OwnerMicro Focus
WebsiteMicro Focus Atalla Software

Micro Focus Atalla is a security vendor, with experience in data security and cryptography.[1] Atalla is required to meet government standards while providing end-to-end network security.

On September 7, 2016, HPE CEO Meg Whitman announced that the software assets of Hewlett Packard Enterprise, including Atalla, would be spun out and then merged with Micro Focus to create an independent company of which HP Enterprise shareholders would retain majority ownership. Micro Focus CEO Kevin Loosemore called the transaction "entirely consistent with our established acquisition strategy and our focus on efficient management of mature infrastructure products" and indicated that Micro Focus intended to "bring the core earnings margin for the mature assets in the deal - about 80 percent of the total - from 21 percent today to Micro Focus's existing 46 percent level within three years."[2] The merge concluded on September 1, 2017.

On the 18th of May, 2018, Utimaco, a German producer of hardware security modules (HSM), announced intent to acquire Atalla business from Micro Focus. Utimaco plans to undertake the sections of HSM and ESKM.[3]

Company History

Originally founded as the Atalla Corporation in 1973 by Dr. Martin Atalla. Merged in 1987 with Tandem Computers.

Product Overview

Atalla is a multi-chip embedded cryptographic module, which consists of a hardware platform, a firmware secure loader, and firmware. The purpose of the module is to load Approved application programs, also referred to as personalities, securely. The firmware monitors the physical security of the cryptographic module. Verification that the module is approved can be observed.

The Atalla security policy addresses the hardware and the firmware secure loader. This approach creates a security platform able to load secure code. Once control passes from the loader, the module is no longer operating in FIPS mode. Note: that no personality will have access to the module’s secret keys.[4] The cryptographic boundary of the ACS for the FIPS 140-2 Level 3 validation is the outer perimeter of the secure metal enclosure that encompasses all critical security components.

References

External links