Document Library 127 ITEMS
To help improve its security and alignment with eIDAS, the new Ardaco QSign Mobile service leverages the Entrust Remote Qualified Signature Creation Devices (QSCDs) that include high-performance nShield® hardware security modules (HSMs) bundled with Entrust Signature Activation Modules (SAMs).
Oasis Smart SIM developed its own Key Management System to support two GSMA-certified PKI deployments, backed by two Entrust nShield HSMs in a secure data center in France.
Trident HSM is an integrated solution to enhance the security of your security infrastructure.
As a signing service solution provider, 3Key Company has been working with Entrust to develop a comprehensive and easy-to-implement remote signing solution for organizations in the EU and beyond.
Antel chose Entrust over competitors because of its cloud security capabilities, ease of deployment and flexibility for users.
Entrust and Securosys have teamed up to offer a high performing solution that integrates the best of both companies’ security technologies to ensure trusted identity, signing and encryption, while knowing your privates keys are safe and secure.
Read how SIGNIUS developed a cloud and on-premises document and contract signing platform with an Entrust nShield HSM as a Qualified Signature Creation Device, providing an end-to-end digital contract management and eIDAS-compliant remote signing service, with strong and flexible customer identification.
Database encryption solutions help protect enterprises’ most sensitive data. Entrust partners with leading database encryption providers to high assurance protection of the underlying encryption keys.
Solution delivers lifecycle management of keys protecting on-premises and cloud-based encrypted workloads, with a FIPS and Common Criterial certified high assurance option.
Red Hat Certificate System issues, manages, and validates the digital identities used to bind people, devices, or services to their corresponding private keys. Entrust nShield HSMs increase the assurance level of the PKI by protecting the private root and signing CA keys.