
Intertrust Launches Transformational Virtual Secure Room as a Service
Intertrust iSCIF delivers scalable cryptographic key management at dramatic (75%+) cost reductions while meeting and exceeding industrial security standards – ideal for authenticating internet-connected CE and IoT devices and systems
Berkeley, CA, USA — [July 02, 2025] — Intertrust today unveiled Intertrust iSCIF, a cloud-based virtual secure room solution, or secure compartmented information facility (SCIF) that exceeds physical SCIF security standards. iSCIF delivers substantial operating cost reductions and operational flexibility. The cloud-based solution also eliminates the chronic underutilization of capital equipment, sitting idle until it is needed.
Physical SCIFs have been the gold standard for generating and managing digital certificates and cryptographic keys that authenticate networked devices, software and people. They are governed by rigorous international standards that set levels of security and integrity. Physical SCIFs are expensive to operate and require significant hardware to maintain. Intertrust designed iSCIF to run in the cloud and eliminate the need for expensive physical infrastructure. This is essential to the scalability in a world of billions of connected devices and apps.
Why This Matters—Beyond the Economic Benefits
- Security enhancements. Uses cloud Hardware Security Modules (HSMs), secure enclaves, and AI-driven threat detection for protection that physical sites struggle to match
- Cloud elasticity. Dynamically scales to match spikes in demand.
- Operational agility. Enables disaster recovery in minutes, global scaling, and 24/7 automated monitoring without reliance on human scheduling
- Future proof. Establishes the backbone for next-gen security ecosystems, leveraging advanced cloud and automated services
Redefining Secure Key Management
iSCIF’s use of advanced cloud security technologies, including trusted execution environments, secure enclaves, and dedicated cloud hardware security modules (HSMs) to create isolated computing spaces that are cryptographically separated from other system operations. iSCIF also automatically scales resources up or down based on actual demand, for optimum efficiency.
“Virtual secure rooms mark a seismic shift in enterprise security,” said Julian Durand, Intertrust CSO and SVP of Product Management. “Traditional SCIFs are too costly and complex. Our iSCIF solution provides the agility and cost-effectiveness modern enterprises need while meeting or exceeding all security demands.”
Dramatic Cost Reduction
iSCIF delivers compelling economic advantages, achieving 3x-4x lower total cost of ownership compared to physical implementations. Organizations eliminate substantial expenses across physical hardware requirements and real estate costs, bonded security-cleared personnel for on-site operations, and duplicate facility infrastructure for disaster recovery.
The solution also removes travel costs for multi-site maintenance and testing while eliminating the need for complex video monitoring and multi-operator authentication systems that burden physical SCIFs.
Enhanced Security and Operational Agility
iSCIF brings hardware-based key isolation via cloud HSMs, secure multi-party control with quorum-based access requirements, and continuous automated monitoring with AI-driven threat detection capabilities. Organizations benefit from immutable activity logging and predictive analytics that provide unprecedented visibility into their cryptographic operations.
Disaster recovery is possible in minutes versus days through cloud availability regions, seamless scaling for high-volume key generation, and faster, more consistent security updates and patching. The solution maintains smart card and biometric authentication capabilities in virtualized environments, ensuring familiar security protocols while gaining cloud flexibility.
Cross-Sector Impact
The iSCIF solution addresses critical needs across multiple sectors:
- Enterprise PKI Managers looking to reduce complexity and cost while maintaining secure root key environments
- Security Officers maintaining compliance and operational security without legacy overhead
- IT Infrastructure Leaders transitioning PKI to the cloud with confidence and cost control
- IoT Manufacturers and Operators securing device identity and provisioning at scale
Foundation for Tomorrow’s Security Ecosystems
With iSCIF, organizations can establish a forward-looking approach for advanced, service-based security platforms. Enterprises can integrate additional security services including extended protection systems, automated threat response capabilities, and advanced security analytics—all delivered through cloud platforms.
“This isn’t just an infrastructure upgrade—it lays the groundwork for next-generation security ecosystems,” added Durand. “Organizations implementing our cloud-based key management can focus on their core business while leveraging specialized security services that continuously evolve with emerging threats.”
Availability and Professional Services
iSCIF is available now through tailored professional services that help organizations design their ideal virtual secure environment. These services include assisting organizations in migrating their physical SCIFs to the cloud. The solution integrates seamlessly with existing security architectures and operational workflows.
Organizations interested in learning more can schedule a meeting to learn how iSCIF can modernize and scale their PKI operations securely and efficiently.
About Intertrust
Intertrust, a pioneer and innovator in the field of trusted distributed computing, creates solutions to persistently protect IoT services and data assets—in transit, in use, and at rest. Headquartered in the San Francisco Bay Area, Intertrust develops and licenses its technologies for IoT, AI, and Web3. Its digital rights management (DRM) technology continues to revolutionize the media and entertainment industry and paves the way for today’s video and music streaming services and Web3 marketplaces. For more information, visit us at intertrust.com, or follow us on X or LinkedIn