General Purpose HSMs
nShield general purpose HSMs
nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption, key management, and more. nShield hardware security modules are available in a range of FIPS 140-2 & 140-3* certified form factors and support a variety of deployment scenarios.
*Anticipated June 2023.
The nShield Difference: Security World
Only nShield HSMs feature Security World, a specialized architecture that provides unmatched capabilities in several crucial areas:
Security World provides strong, granular controls over the access and usage of keys and policies.
Unlike alternatives that require backup HSMs and labor-intensive HSM cloning, Security World enables simple, automated backups of HSM files.
Security World delivers unlimited key storage and the flexibility needed to align your HSM operations with your organization’s specific needs.
nShield HSMs can be managed centrally based on unified policy and operational administration, no matter how many nShields you deploy.
Unique nShield Benefits
Combine nShield HSM models to build a unified ecosystem that delivers scalability, seamless failover and load balancing.
Three models with multiple performance tiers, including a wide range of elliptic curve cryptography (ECC) options that deliver industry-leading transaction rates.
The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.
- Click to select...
Public Key Infrastructure
- nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.
- nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.
- nShield HSMs create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.
View the nShield Family of General Purpose HSMs
FIPS-certified (expected June 2023) hardware security appliances that deliver cryptographic services to a variety of applications across the network.
FIPS-certified (expected June 2023), PCI-Express card-based solutions that deliver cryptographic services to applications hosted on individual servers and appliances.
FIPS-certified hardware security appliances that deliver cryptographic services to a wide range of applications across the network.
FIPS-certified, PCI-Express card-based solutions that deliver cryptographic services to applications hosted on individual servers and appliances.
Subscription-based service for generating, accessing, and protecting cryptographic keys with dedicated FIPS 140-2-certified nShield Connect HSMs.
USB-connected desktop HSMs that provide convenience and economy for environments requiring low-volume cryptographic key services.
Certified hardware designed to deliver scalable cryptographic services for issuance software.
What our customers are saying...
We have a long history together and we’re extremely comfortable continuing to rely on Entrust solutions for the core of our business. We have used Entrust HSMs for five years and they have always been exceptionally reliable. We’ve layered a lot of code on top of the HSM; it delivers the performance we need and has proven to be a rock-solid foundation.
As a global payment solutions and commerce enablement leader, Verifone’s strategy is to develop and deploy “best in class” payment solutions and services that meet or exceed global security standards and help our clients securely accept electronic payments across all channels of commerce. We selected Entrust HSMs to provide robust security, unmatched performance, and superior scalability across our payment security platforms…
The Entrust nShield sales team provided excellent local and remote support during this evaluation period and was invaluable to the process. The excellent depth, breadth, and quality of the product documentation gave us confidence that the solution was well thought-out and supported.
Entrust provided the expertise needed to design and implement a tailored, secure VoIP solution.