Skip to main content
purple hex pattern
illustration of woman walking next to large cloud with keyhole

Your cryptographic keys in our cloud

With Entrust Cryptography-as-a-Service (CaaS), you maintain complete control over the creation, management, and use of your cryptographic keys without the need for your own on-prem experts or hardware security modules (HSMs). Our cryptographic experts maintain and operate the service from secure, ISO 27001 certified facilities, allowing you to use certified, high-performance HSMs.


rocket icon

Get high availability hosted HSM services at a fraction of the cost of purchasing and managing your own HSM and on-prem crypto experts.

faded gray hex background
support icon

Our cryptography experts manage the service to best practices 24/7.

faded gray hex background
clipboard checked list icon

You maintain complete control over the creation, storage, and management of your cryptographic keys.

faded gray hex background


shield icon with four quadrants of purple and gray

Certified Security

Keys are always stored and managed in FIPS 140-2 Level 3 certified and EAL4+ validated hardware.

network icon

Flexible Functionality

Our CaaS supports all major algorithms and cryptographic APIs, and is suitable for any key type, including digital signing and encryption.


Policy Enforcement

Only you can access your key material, even when key material needs to be revoked or updated for key rollover.

trophy icon

Applied Best Practices

Audited policies and procedures ensure your HSM services are secure and reliable.

Learn more about Entrust's Managed PKI services

Connect with an Expert

Our experts will contact you to discuss how our solutions can meet your needs.