Thales delivers high assurance and trust across business critical applications with next generation Hardware Security Modules (HSMs)
nShield XC delivers high speed crypto and unique custom application protection for advanced cloud, mobile and IoT applications
Thales, leader in critical information systems and cybersecurity, announces nShield XC, its next generation hardware security module (HSM) for application security. With accelerated crypto performance, best-in-class Elliptic Curve Cryptography (ECC) and unique CodeSafe application protection, nShield XC meets the increasing demands of customers as they deploy certified crypto to protect their data and applications.
Proven support for high volume Public Key Infrastructure (PKI) and public cloud computing: Efficient crypto processing is essential in high volume crypto transaction environments. nShield XC builds on the legacy of previous models to support demanding credential issuance environments such as high tech device manufacturing and the public cloud.
Network-grade SSL/TLS: Performance is a constant concern in the networking world as is the need for seamless security. nShield XC brings turbo speed crypto processing for already proven integrations with Application Delivery Controller partners including Citrix and F5 Networks.
Unique custom application HSM hosting: nShield XC expands Thales’s unique CodeSafe feature, allowing customers to run larger and more powerful applications within the secure boundary of the HSM, helping them safeguard their most sensitive custom applications and the data they handle. Thales customers have used CodeSafe for a wide variety of use cases, including streaming media protection, digital currency, and implementation of custom cryptographic algorithms.
Cindy Provin, president Thales eSecurity Inc., says:
"As organizations deploy more cryptography, in more places, they need to be sure that their cryptographic resources can handle the demands and don’t create bottlenecks. The nShield XC offers higher performance to support high volumes of cryptographic transactions providing the trust that protects the cryptographic infrastructure. As organizations, leverage big data or cloud services and implement public key infrastructure in support of the internet of things, trust and control are of paramount importance and need to be delivered on a large scale. We are very pleased to be launching the nShield XC in response to the increasing requirements of our customers."
David Monahan, senior analyst, Enterprise Management Associates, says:
"Companies need hardened security solutions that deliver a strong root of trust as the foundation for enterprise class data protection in their security and risk management programs. These solutions must meet operational demands in maintaining remote management, high levels of performance and reliability, and address critical needs such as key management at scale, across multiple data centers and cloud providers. With the continued explosion of sensitive data across connected devices, organizations failing to do so will fall behind and may ultimately fail."
Marissa Schmidt, director of product management, NetScaler at Citrix, says:
"The integration of Citrix NetScaler with Thales nShield provides our mutual customers with technology to enhance security while offering a secure and cost-effective solution for SSL key management. Citrix customers increasingly demand high performance solutions that provide robust levels of protection for cryptographic keys. We welcome Thales's next generation nShield XC to continue to meet these needs."
Jon Kuhn, Senior Director, Product Management, F5, says:
"F5 and Thales customers are demanding high-performance solutions that provide flexibility as they redesign their environments to neutralize evolving threats around SSL/TLS—whether that means providing support for the newest ciphers, enhancing key management, or improving IPS and DLP service scalability. With the companies’ long-time partnership, joint customers are well positioned to take advantage of the new nShield XC platform to address increasingly sophisticated security demands."