Protecting e-transactions

Securing electronic transactions based on a trusted infrastructure.

Securing your e-transactions

When making an e-transaction, ensuring the integrity and confidentiality of that transaction is a vitally important issue. Securing payments –  effectively a transaction in its own right – is also highly sensitive. In case of fraud, companies and financial institutions can suffer significant losses in terms of damaged reputations and the theft of sensitive data as well as financial loss. That is why securing transactions demands efficient, reliable and flexible security solutions, fully integrated into information systems and payment systems, in compliance with industry standards.

Working in collaboration with major international banking networks, financial institutions and strategic partners such as software publishers, Bull has designed the C2P range of Hardware Security Modules (HSMs), addressing market demands as well as the highest security requirements: crypt2pay, which secures financial transactions, and crypt2Protect which supports transaction security in its broader sense.


Building a trusted infrastructure 

As a growing number of internal and external exchanges (with customers or partners) are computerized, securing electronic transactions and information systems more broadly is a key issue for organizations.

Electronic certificates allow applications to integrate security services such as user authentication, non-repudiation of transactions and the confidentiality of data exchanges and transactions. Bull – a leading European player on IT security – offers comprehensive solutions for creating electronic certificates and manage their lifecycle.

Beyond the management of digital certificates, Bull also offers a wide range of security solutions to meet the needs of applications to include electronic signature and/or time-stamping functionality to created shared, comprehensive and sustainable trusted infrastructures. Bull supports organizations in implementing these infrastructures, from the initial definition of needs right through to their integration and hosting in our highly secure centers.

  • Metapki : secure registration, creation and management of identities 
  • Metasign : creation and verification of secure transactions
  • Metatime : reliable time-stamping solution for transactions and archives
  • VeriCert : centralizing the validation of public key certificates


Contact Expert

Pierre - Jean Aubourg
Head of Protection E-Transactions