Future-Proof Your Security

Migrating from nShield XC to nShield 5 HSMs

In October 2024, we announced an end-of-sale date for nShield Solo XC and Connect XC HSMs (excluding Common Criteria-specific versions) of October 31, 2025, and an end-of-maintenance date of December 31, 2027. 

We want to help you make a proactive, informed decision regarding your hardware security module (HSM) migration. This page outlines various considerations and options available to you, ensuring you have the best possible migration experience.

nShield HSM XC migration

Why Migrate Now?

An end-of-support date of December 31, 2027, may seem like a long way away, but keep in mind that HSM migrations don’t happen overnight. Live deployments can take many months to coordinate with multiple teams within your organization to ensure alignment with your budget, capacity, maintenance schedules, and more.

Plus, cybersecurity experts worldwide have been saying that the time to prepare for post-quantum (PQ) is now, and our nShield 5 HSMs have the capability to provide your cryptographic security needs now and into the PQ era.

Why nShield 5?

Our nShield 5 HSMs can help you future-proof your cryptographic security. They offer the highest levels of protection by providing a scalable platform for managing cryptographic keys and securing sensitive data, enabling your organization to easily expand your security infrastructure as your needs evolve.

All form factors offer:

  • Native NIST post-quantum algorithm support
  • The latest industry security certifications such as FIPS 140-3 and Common Criteria
  • New field-upgradable features
  • Seamless integration with numerous third-party technology partners 

nShield 5s HSM

Low-profile PCIe card form factor for direct integration with a single server.

nShield 5c HSM

Network-attached form factor for multi-server environments.

nShield as a Service (nSaaS)

All the same functionality as our on-premises nShield 5 HSMs, but in a subscription-based cloud deployment that eliminates the need to host and maintain physical appliances.

Next Steps

1. Audit your current deployment

As with any migration plan, it’s good to look at your current deployment and consider factors that will inform your migrations steps, such as:

  • Number of nShield HSMs per location, model, and performance
  • Client license details and feature activation(s)
  • Version(s) of nShield HSM firmware
  • Number and version(s) of Security World architecture
  • Details of Security World Cipher Suite
  • Details of any vendor application being used in conjunction with your nShield HSM
  • CodeSafe application (if deployed)

2. Contact us to discuss a migration plan

Our cross-functional team of account managers, technical sales consultants, professional services representatives, and partners are here to support you during this migration period. Once we’ve discussed the details of your current deployment, we can help you map out your recommended next steps, allowing you to tackle your nShield HSM migration with a budget and at a pace that makes business and operational sense for your organization.

We fully recognize the critical role that Entrust nShield HSMs play in safeguarding your business applications, both in operational and backup environments. We are committed to working proactively with you to ensure you are well prepared and to provide you with the best possible migration experience.

For more guidance, read our nShield XC to nShield 5 HSM Migration Tips

Contact Us

Fill out the form and one of our HSM experts will contact you to discuss how nShield HSMs can protect your organization.