In our Securosys ICO Review (SET) you can find all the information you need to know about this Initial Coin Offering: Securosys ICO Start & End, Securosys ICO Price, Whitepaper, SET Team, Soft & Hard Cap, accepted currencies & more.
Secure management and storage of private keys for crypto assets and blockchain systems is paramount. Existing solutions like printouts or offline storage on USB sticks are neither secure nor reliable, nor do they scale for institutional applications. Securosys is extending the functionality of its hardware security modules (HSM) for secure storage, access and use of blockchain and crypto assets keys. Also, Securosys will develop secure computing platforms and key management systems, which are currently lacking in blockchain systems. To support and serve customers on-site all over the world, Securosys is going to expand its international presence. Securosys has decided to conduct an Initial Token Offering (ITO) to finance the development of the mentioned new platforms and the scaling of its existing operational business. These tokens can be converted into Securosys company shares. They entitle to the same amount of dividends as the corresponding company shares. Securosys has reserved 25% of its shares for this ITO. The following whitepaper details the value proposition of our business, the products we deliver and the token sale including the token mechanics. Securosys is a proven company, with a proven team, and proven products. Securosys HSMs protect the Swiss financial infrastructure operated by SIX Group AG on behalf of the Swiss National Bank, securing financial transactions of more than CHF 100 Billion every day. In 2017 Securosys had revenues of CHF 4.7M and an EBITDA of CHF 1.1M, and thus achieved the second year of profitability.
HSMs don’t just have to attain the highest security available – they also have to reach the best possible reliability. HSMs are enterprise products. That’s why at Securosys, we go way beyond the typical standards and procedures used for electronics!
Take a look at our blog post that explores the safeguarding of crypto assets - in particular side-channel attacks, randomization weaknesses, quantum protection, and preventing unauthorized transactions.