The goal of this document is to describe how the Trident HSM can be used as a hardware security module (HSM) for Entrust Security Manager, to generate and maintain keys.
This Integration Guide is part of the Bring Your Own Key (BYOK) Deployment Service Package for Microsoft Azure and covers the creation and transfer of a cryptographic key for use with Azure Key Vault. This cryptographic key, known as a tenant key if used with Azure Rights Management Service and Azure Information Protection, is created within the protection of the nShield Security World on the customer's premises and then securely transferred to Microsoft Azure and the protection of an nShield Security World hosted within Azure via Key Vault.
This guide explains how to configure an RHCS installation with an nShield Hardware Security Module (HSM). The integration between the HSM and Red Hat Certificate System uses the PKCS #11 cryptographic API.
This guide describes how to integrate a Red Hat OpenShift cluster with an nShield Hardware Security Module (HSM), using the nShield Container Option Pack (nSCOP). OpenShift is an application hosting platform by Red Hat. It makes it easy for developers to quickly build, launch, and scale container-based web applications in a public cloud environment. nSCOP allows application developers, in the container-based environment of OpenShift, to access the cryptographic functionality of an HSM.
Encryption Consulting MyCodeSigner provides a secure and flexible solution to your code-signing needs for signing Windows, Linux, Macintosh, Docker and Android/iOS apps. The framework can be extended to protect any other code or document as requested.
Entrust nShield HSM環境でのセキュリティと運用効率の最適化を可能にするシステム
CyberArk Conjur offers secrets management for applications and services. There are four different deployment models.
Antel chose Entrust over competitors because of its cloud security capabilities, ease of deployment and flexibility for users.
This document describes how to integrate Securosys Primus HSM or CloudsHSM service with Entrust Certificate Authority (Security Manager 10 or 8.3), to generate and use Security Managers key material within the protected boundary of Securosys Hardware Security Modules.
Entrust and Securosys have teamed up to offer a high performing solution that integrates the best of both companies’ security technologies to ensure trusted identity, signing and encryption, while knowing your privates keys are safe and secure.