Skip to main content
SharedSecure logo


ShardSecure desensitizes sensitive data in the cloud through a patented process known as microsharding, which makes data unintelligible and of no value to unauthorized users. Think of it like RAID-5 for data in the cloud that neutralizes cloud storage ransomware, improves data resilience and business continuity, and leaves the data owner in control of their data in hybrid- and multi-cloud environments.

Solution Description

The Entrust/ShardSecure partnership ensures that unstructured data in cloud environments and on-prem is well protected against outages, attacks, and other forms of data compromise. We offer two integrations of ShardSecure with Entrust: nShield HSMs and Entrust Key Control Compliance Manager.

The integration of ShardSecure with Entrust nShield HSM combines the benefits of ShardSecure’s file-level encryption with the secure key generation and management of Entrust’s nShield HSM (Hardware Security Module). Specifically, the ShardSecure engine encryption keys for the internal distributed cache reside in an Entrust nShield HSM for at-rest encryption on the ShardSecure cluster. This enables all encryption keys leveraged by ShardSecure to be stored in very secure, dedicated hardware. It also ensures that encryption operations like encrypting and decrypting will be protected by the nShield HSM, adding a layer of security for a defense-in-depth approach.

The integration of ShardSecure with Entrust KeyControl provides a singular compliance-centric dashboard view of keys and secrets across on-prem, public cloud, and hybrid cloud environments, including information about ownership, environment, purpose, and critical system.


New York

New York


United States

Entrust Ready Technology Partner Program



  • Cloud, DevOps
  • Encryption, Database Security


Entrust KeyControl Vault for File Encryption

Solution Briefs

open folder icon
June 10, 2024
Talk to an expert

Our experts will contact you to discuss how our partnerships and solutions can meet your needs.