HSM Custom Cryptographic Solutions
Design, Develop, and Deploy Cryptographic Solutions – Protecting You, Protecting Your Customers
Security is not a one size fits all commodity. Customers buy security products to solve specific business problems. At Entrust Professional Services, we understand that security is key to your business and ongoing customer confidence, but that your business is not necessarily all about security. Without an appropriate architecture and application development process to deliver real solutions, encryption-based data protection efforts can fall short of meeting compliance, security, and business continuity objectives. Entrust Professional Services can provide assistance and support throughout the development lifecycle. From network infrastructure, virtualization and bespoke application code development, through to advice on achieving PCI DSS compliance, to deployment and training across your enterprise, Entrust Professional Services provides you with the skills and expertise to develop a solution that’s right for you and good for your business. Entrust Custom Cryptographic Solutions include:
- Internet of Things
- Enterprise Code Signing Solution
- HSM Application Integration
- Crypto as a Service
- Encryption Application
Contact Entrust Cryptographic Solutions team to learn more about these services.
Code Signing to Protect Your Applications
Given the prevalence of malware and Advanced Persistent Threats (APTs), many software vendors, providers of online services, and enterprise IT organizations are under pressure to increase the security of their code signing process. The nShield Code Signing solution helps software producers of all types implement highly secure and efficient code signing processes that protect their organizations from risks associated with software tampering. Combining tamper-resistant nShield HSMs with support from Entrust Professional Services (PS), the nShield Code Signing solution is backed by our extensive expertise in code signing best practices and standards of due care. HSMs provide tamper-resistant, certified protection for private code signing keys and a secure platform to perform critical digital signature processes. nShield Code Signing also offers a flexible range of capabilities to simplify and automate the code signing request/approval workflow for organizations with more complex requirements.
Each nShield Code Signing solution includes one or more nShield HSMs, the nShield Code Signing framework, and service days appropriate to your specific requirements. Entrust PS will design and configure your solution to support your specific code signing workflow. nShield Code Signing is offered in three configurations:
- Developer. This code signing solution is designed for the individual developer workstation for low volumes of code signing.
- Workgroup. This code signing solution is designed for organizations with multiple build stations where a shared signing resource is advantageous.
- Enterprise. This code signing solution is designed for larger organizations with requirements for highly controlled software signing approval process workflows with robust end-to-end audit capabilities.
Code Signing Benefits
Automated Solution
Simplify and streamline the code signing process using workflow automation capabilities.
Quick Implementation
Get a high-assurance code signing process appropriate to your organization’s size and scope.
Secure
Maximize protection from outsider and insider attacks with a tamper-resistant code signing solution.
Code Signing Resources
Code Signing Gateway
The Code Signing Gateway provides a range of flexible and centralized workflow automation functions that help software development organizations meet security requirements.
nShield Code Signing
Learn more about Entrust’s significant expertise in developing and implementing secure code signing solutions.
Establishing Trust and Integrity with Code Signing
Secure code signing is essential for securing and ensuring the integrity and authenticity of software and executables, especially updates delivered via unsecured channels.
HSM Application Integration – Expertly Integration Your Applications with Entrust nShield HSMs
Organizations taking advantage of nShield hardware security modules (HSMs) frequently require custom code to integrate cryptographic capabilities into their applications.
Secure coding requires special skill; developers must be careful to utilize best practices and avoid introducing security risks and performance bottlenecks. For organizations that do not have in-house staff with secure coding skills, or need to supplement their teams with additional capacity and expertise, Entrust Professional Services offers expert custom development services that can accelerate projects and deliver secure and efficient results.
You can work with Entrust Professional Services in whatever way best meets your needs. As experts in Entrust products and development toolkits, we can provide advice and knowledge transfer, work alongside your team to add capacity for critical projects, or complete your custom integration from start to finish. However you choose to work with us, you can be assured of expert professional help that shortens development cycles, raises your team’s security awareness, and ensures that you receive the best possible return on your investment in security solutions.
In situations where you plan to do most or all of your own application integration, Entrust Professional Services provides a number of services and tools to support your efforts. These include:
Development toolkits.
Entrust offers two optional application integration toolkits:
- With the CipherTools Developer Toolkit, you can take full advantage of the advanced capabilities offered by the nShield HSM family as you integrate HSMs with your applications. The toolkit contains detailed tutorials and reference documentation, sample programs written in a range of high level languages, and additional versions of libraries to expand capabilities for integration with business applications beyond those that can be achieved by the standard application program interfaces (APIs).
- The CodeSafe Developer Toolkit enables application developers to write programs that are securely loaded and executed within the secure environment of the nShield HSM, protecting them from malware and Trojans attacks on host systems. CodeSafe provides an application “sand box” setting where code can be validated for integrity and authorized to execute in a tamper-resistant manner—ideal for applications residing in untrustworthy locations.
Integration guides.
For commonly encountered integration tasks, Entrust has prepared guides that can help your team save time and avoid common pitfalls by utilizing best practices for integrating nShield HSMs with specific commercial software applications.
Developer support
To ensure that you can obtain the help you need when you need it, Entrust offers multiple levels of support contracts, including developer support, giving you access to experts in Entrust products, developer toolkits, and APIs.
Application Integration Service Benefits
Custom Development Service
Accelerate time-critical projects by compressing the learning curve and deliver secure and efficient results.
Flexible Range of Services
Our team works with you to add capacity for critical projects, complete your custom integration from start to finish, or provide advice and knowledge transfer if that’s your need.
Strong Support
Engage as much or as little help as you need to integrate cryptographic capabilities into your applications.
Additional Resources
Entrust nShield HSMs Brochure
Entrust nShield HSMs are hardened, tamper-resistant devices that protect your company’s most sensitive data.
Security World Architecture
The nShield Security World architecture supports a specialized key management framework that spans the entire nShield family of general purpose HSMs.
CodeSafe Developer Toolkit
CodeSafe is a set of tools that enable developers to write and execute sensitive applications inside the tamper-resistant boundary of FIPS-certified nShield HSMs.
nShield Connect
Entrust nShield® Connect hardware security modules (HSMs) are FIPS 140-2 Level 3 and Common Criteria EAL4+ (EN 419 221-5) certified appliances that deliver scalable and highly available cryptographic key services across networks.