Why choose

Hardware based security

Our system works in combination with hardware roots of trust that secure data in motion at every endpoint. Cryptographic keys are managed in specialised hardware, which protects them from being exploited.  

We guarantee maximum trust, by operating a hybrid hardware and software based security system .  

Shared key and responsibility; Threshold based approach

Transactions are only permitted when a specified number of parties authorise a transaction.

Our system is based on distributed and decentralised keys, together with an N of M authorisation system that guarantees security and shared responsibility. This means that no single entity has control of the crypto assets.   

Secure by design

Each element of the platform has been designed with a bottom-up approach. Security is not added on top, but is built into the core of our system.  

Designed ‘in line’ with evolving international standards

As part of the international standardization framework, Hokan is contributing to the defining of standards and rules. S imultaneously, we evolve our platform according to them . O ur products will continuously be developed according to the new rules of the international blockchain framework.  

White label platform

Provided as a white-label solution, Hokan allows an organisation to become the custody provider and gives clients a ‘best in class’ service that dovetails easily into existing business processes.  

Integrated KYC

The Hokan platform comes with integrated KYC functionalities, in order to make it easier to comply with customer due diligence and anti-money laundering regulations.  


  • 01. Withdrawals require Multi-sig authorization
  • 02. Built-in full auditing and reporting
  • 03. Leverages a Fully Secure encrypted OS
  • 04. Multichain platform

  • 05. Dedicated support
  • 06. Cloud & On-premises
  • 07. Mandatory 2FA
  • 08. High security hardware key

Contact us