deenfr

Storage Excellence. Quality. Integrity.watch video
v

WHAT WE DO

Crypto Storage AG offers a proprietary infrastructure solution to manage private keys, both physical and digital, on highest grade hardware security modules with detailed configuration options for individual and role-based access control. The Approval Framework is implemented using hardware Approval Terminals and is independent of the underlying assets. The infrastructure is developed in Switzerland and offers financial intermediaries a tailor-made, secure and flexible solution for securely managing digital assets.
Crypto Storage AG serves financial intermediaries worldwide with a top-tier storage solution for digital assets.

WHY DO IT WITH US

Multitude of crypto assets

Crypto Storage AG supports a wide range of digital assets such as: Bitcoin, Bitcoin Cash (ABC and SV), Ripple, Litecoin, Doge, Feathercoin, IOTA, Ether, Ether Classic and all ERC 20 tokens.

Swiss Engineering

The Hardware Security Module (HSM), the tamper-proof approval terminals, and the tailored software solution are all developed by leading Swiss providers with vast experience in finance and IT-security.

Access Management

Approval rules to the digital assets are coordinated on a high level, however are checked in the innermost security layer of the security architecture, independent of the underlying blockchain.

diver

Flexible Rule-Engine

m of N multiple signers, a quorum of signers from several different groups, time delays that allow for a veto-period, are all supported in combination and flexible natively.

Secure Approval Terminals

The approval terminal hardware devices adhere to a much higher security standard than the signing devices customary for crypto assets.

Reliability

Crypto Storage AG’s corporate governance, processes, and operations are audited and a “System and Organisation Controls 2 (SOC 2) Report” Type 1 in accordance with ISAE 3000 is issued.

HOW WE DO IT

Crypto Storage AG will allow for highly configurable access to the stored digital assets with institutional-grade access control rules. The private keys never leaves the hardware security module (HSM) and the HSM's right to sign a transaction is determined through approvals from a configurable quorum within the financial intermediary and executed on tamper-proof approval terminals. The solution is highly adjustable to internal processes and roles of financial intermediaries, while maintaining high security behind several layers of hardware protection.