nShield general purpose HSMs

nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption, key management and more. nShield hardware security modules are available in three FIPS 140-2 certified form factors and support a variety of deployment scenarios.

Download our nShield Brochure to learn more.

The nShield Difference: Security World

Only nShield HSMs feature Security World, a specialized architecture that provides unmatched capabilities in several crucial areas:

settings icon in hex shape orange

Full Control

Security World provides strong, granular controls over the access and usage of keys and policies.

Cloud Backup

Easier Backups

Unlike alternatives that require backup HSMs and labor-intensive HSM cloning, Security World enables simple, automated backups of HSM files.

enlarge icon in hex shape purple

Scalability and Flexibility

Security World delivers unlimited key storage and the flexibility needed to align your HSM operations with your organization’s specific needs.

process icon in hex shape green

Streamlined HSM Operations

nShield HSMs can be managed centrally based on unified policy and operational administration, no matter how many nShields you deploy.

Security World Architecture whitepaper

Beyond Security

Unique nShield Benefits

Icon

Powerful Architecture

Combine nShield HSM models to build a unified ecosystem that delivers scalability, seamless failover and load balancing.

Icon

Performance and Versatility

Three models with multiple performance tiers, including a wide range of elliptic curve cryptography (ECC) options that deliver industry-leading transaction rates.

Icon

Applications and Data Protection

The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.

Details

    Product Uses

    Public Key Infrastructure

    • nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.

    Code Signing

    • nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.

    Digital Certificates

    • nShield HSMs create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

    View the nShield Family of General Purpose HSMs

    What our customers are saying...

    Square logo
    Square
    Verifone logo
    Verifone
    Memjet logo
    Memjet
    Polycom logo
    Polycom

    Square

    We have a long history together and we’re extremely comfortable continuing to rely on nCipher solutions for the core of our business. We have used nCipher HSMs for five years and they have always been exceptionally reliable. We’ve layered a lot of code on top of the HSM; it delivers the performance we need and has proven to be a rock-solid foundation.

    Neal Harris, Security Engineering Manager, Square, Inc

    Verifone

    As a global payment solutions and commerce enablement leader, Verifone’s strategy is to develop and deploy “best in class” payment solutions and services that meet or exceed global security standards and help our clients securely accept electronic payments across all channels of commerce. We selected nCipher* HSMs to provide robust security, unmatched performance, and superior scalability across our payment security platforms…

    Joe Majka, Chief Security Officer, Verifone

    Memjet

    nCipher Security’s* nShield sales team provide excellent local and remote support during this evaluation period and was invaluable to the process. The excellent depth, breatdth, and quality of the product documentation gave us confidence that the solution was well though-out and supported.

    Robert Fairlie-Cuninghame, QAI Technical Lead/Architect, Memjet

    Polycom

    nCipher* provided the expertise needed to design and implement a tailored, secure VoIP solution.

    Marek Dutkiewicz, Polycom

    Resources

    Datasheet

    Code Signing Gateway

    White Paper

    Establishing Trust and Integrity with Code Signing

    Contact a Specialist

    An HSM specialist will be in touch with options soon.