New

Utila Secures $18 Million Series A To Meet Surging Demand for Institutional MPC Wallets Amid Stablecoin Boom

Utila Secures $18M Series A

Security is a foundational value and at the heart of our origin

Utila’s enterprise-grade crypto operations platform is built by cybersecurity and cryptography experts, and security is, and always will be, the bedrock of our ethos.

Learn more

The Most Secure and Scalable
Institutional Crypto Operations Platform

MPC for Secure Key Management and Signing

Utila uses Multi Party Computation to eliminate private keys as single points of failure. Utila divides private keys into multiple shares in a manner where the control over the private key is divided between the customer and Utila.

One part of the key is stored securely on Utila’s cloud environment and the other part is stored on the customer’s device, behind biometrics. Throughout the entire lifecycle of the key, from key generation to signing transactions, the key is never reconstructed in a single place.

Secure Transfer and Custody Environment

Outgoing transfers from your Utila Vault are secured via tight policy controls which can only be defined and managed by a quorum of Admins. This ensures that only authorized users can initiate, approve and sign transactions and that critical policy and environment actions require approval from multiple administrators.

Multiple Layers of Signing Key Protection

Utila uses mobile device Biometrics and supports passkeys for Multi Factor Authentication to secure access to key shares on a device. In addition, every key share is uniquely bound to a specific user and device and can not be used on a different device with a malicious actor.

Separation of Duties for Initiation vs Approval and Signing

Transactions can be initiated by users via the Console (web) or through API, but signed and published on another approved device (mobile or API). This allows greater flexibility when designing and building the security of the approval workflow of transactions and the access to private key shares.

End-to-end Encrypted Key Share Propagation

New devices receive existing MPC key shares in an end-to-end encrypted manner from another device. At the end of the process, each device has its own unique set of key shares.

Secure Key Backup & Recovery

Utila offers a secure offline backup and recovery process where a customer is able to recover their assets in case of a disaster and lost or damaged devices. During the process only an approved administrator on the customer’s side is able to recover the keys. In addition, customers may choose to use third party backup providers.

Utila is SOC2 Type 2 certified, pentested and audited
by leading web3 security firms.

With this background and the evolving crypto threat landscape,
Utila is committed to maintaining the most advanced infrastructure
and governance controls to safeguard your crypto.

Download Utila In-Depth Security Guide

    By proceeding, you agree to our Terms of Use and Privacy Policy.

    Security at the core

    • Multi Party Computation

      Utila’s MPC protocol is executed between Utila and the customer, each holding one share of the distributed key, in a way where both shares remain private and dispersed at all times.

    • Strong Device Identity

      Every device has a strong cryptographic identity, must be approved by multiple admins and has its key shares uniquely bound to it.

    • Built on the Cloud

      Modern infrastructure and security to support system stability, reliability and maximum uptime.

    Get Started Now!

    Curious about Utila? Get a free demo to explore features, discuss use cases and get all your questions answered.

    Get Started Now