nShield general purpose HSMs

nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption, key management and more. nShield hardware security modules are available in three FIPS 140-2 certified form factors and support a variety of deployment scenarios.

Download our nShield Brochure to learn more.

The nShield Difference: Security World

Only nShield HSMs feature Security World, a specialized architecture that provides unmatched capabilities in several crucial areas:

settings icon in hex shape orange

Full Control

Security World provides strong, granular controls over the access and usage of keys and policies.

Cloud Backup

Easier Backups

Unlike alternatives that require backup HSMs and labor-intensive HSM cloning, Security World enables simple, automated backups of HSM files.

enlarge icon in hex shape purple

Scalability and Flexibility

Security World delivers unlimited key storage and the flexibility needed to align your HSM operations with your organization’s specific needs.

Network icon green

Streamlined HSM Operations

nShield HSMs can be managed centrally based on unified policy and operational administration, no matter how many nShields you deploy.

Security World Architecture whitepaper

Beyond Security

Unique nShield Benefits

Powerful Architecture

Powerful Architecture

Combine nShield HSM models to build a unified ecosystem that delivers scalability, seamless failover and load balancing.

Performance and Versability icon

Performance and Versatility

Three models with multiple performance tiers, including a wide range of elliptic curve cryptography (ECC) options that deliver industry-leading transaction rates.

Laptop and Mobile icon

Applications and Data Protection

The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.


    Product Uses

    Public Key Infrastructure

    • nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.

    Code Signing

    • nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.

    Digital Certificates

    • nShield HSMs create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

    View the nShield Family of General Purpose HSMs

    What our customers are saying...

    Square logo
    Verifone logo
    Memjet logo
    Polycom logo


    We have a long history together and we’re extremely comfortable continuing to rely on Entrust solutions for the core of our business. We have used Entrust HSMs for five years and they have always been exceptionally reliable. We’ve layered a lot of code on top of the HSM; it delivers the performance we need and has proven to be a rock-solid foundation.

    Neal Harris, Security Engineering Manager, Square, Inc


    As a global payment solutions and commerce enablement leader, Verifone’s strategy is to develop and deploy “best in class” payment solutions and services that meet or exceed global security standards and help our clients securely accept electronic payments across all channels of commerce. We selected Entrust HSMs to provide robust security, unmatched performance, and superior scalability across our payment security platforms…

    Joe Majka, Chief Security Officer, Verifone


    The Entrust nShield sales team provided excellent local and remote support during this evaluation period and was invaluable to the process. The excellent depth, breadth, and quality of the product documentation gave us confidence that the solution was well though-out and supported.

    Robert Fairlie-Cuninghame, QAI Technical Lead/Architect, Memjet


    Entrust provided the expertise needed to design and implement a tailored, secure VoIP solution.

    Marek Dutkiewicz, Polycom

    👋 Hello, if you have any
    questions, I'm ready to chat.

    Chat Now