Storage Excellence. Quality. video


Crypto Storage AG offers infrastructure services for ​​digital assets. With our secure proprietary infrastructure, we support financial intermediaries with the implementation and development of custody solutions and tokenisation projects. We also provide advisory services for crypto asset technology, operations, and risk management.


Multitude of crypto assets

Crypto Storage AG supports a wide range of digital assets such as: Bitcoin, Bitcoin Cash (ABC and SV), Ripple, Litecoin, Doge, Feathercoin, IOTA, Ether, Ether Classic and all ERC 20 tokens.

Swiss Engineering

The Hardware Security Module (HSM), the tamper-proof approval terminals, and the tailored software solution are all developed by leading Swiss providers with vast experience in finance and IT-security.

Access Management

Approval rules to the digital assets are coordinated on a high level, however are checked in the innermost security layer of the security architecture, independent of the underlying blockchain.


Flexible Rule-Engine

m of N multiple signers, a quorum of signers from several different groups, time delays that allow for a veto-period, are all supported in combination and flexible natively.

Secure Approval Terminals

The approval terminal hardware devices adhere to a much higher security standard than the signing devices customary for crypto assets.


Crypto Storage AG’s corporate governance, processes, and operations are audited and a “System and Organisation Controls 2 (SOC 2) Report” Type 1 in accordance with ISAE 3000 is issued.


Crypto Storage AG will allow for highly configurable access to the stored digital assets with institutional-grade access control rules. The private keys never leaves the hardware security module (HSM) and the HSM's right to sign a transaction is determined through approvals from a configurable quorum within the financial intermediary and executed on tamper-proof approval terminals. The solution is highly adjustable to internal processes and roles of financial intermediaries, while maintaining high security behind several layers of hardware protection.