Skip to main content
Image
purple hex pattern
Image
man and woman on laptop on server room

nShield general purpose HSMs

nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption, key management, and more. nShield hardware security modules are available in a range of FIPS 140-2 & 140-3* certified form factors and support a variety of deployment scenarios.

*Coordination Stage.

Our Portfolio

Image
nshield 5c
HSM

nShield 5c HSM


nShield 5c HSMs are security appliances that deliver cryptographic services to applications across the network, in the cloud, and in hybrid environments. Deliver cryptographic key services to applications distributed across servers and virtual machines with Entrust’s crypto-agile, highly scalable, next-generation hardware security modules (HSMs).
Image
nShield 5s HSM product image
HSM

nShield 5s HSM


nShield 5s HSMs are PCIe cards that perform encryption, digital signing, and key generation for an extensive range of commercial and custom-built applications, including certificate authorities, code signing, and more.
Image
nshield connect image
HSM

nShield Connect


Enhance security with nShield Connect HSMs - certified, networked appliances providing cryptographic key services across servers and virtual machines.
Image
promo shield solo image
HSM

nShield Solo


nShield Solo HSMs are PCI-Express card-based solutions that deliver cryptographic key services to applications hosted on individual servers and appliances.
HSM

nShield as a Service


nShield as a Service is a subscription-based solution for generating, accessing, and protecting cryptographic key material.
Image
HSM nShield Edge product image
HSM

nShield Edge


nShield Edge hardware security modules (HSMs) are portable USB-connected HSMs that provide cryptographic key services for low-volume transaction environments.
Image
nshield connect image
HSM

nShield HSMi


Certified hardware designed to deliver scalable cryptographic services for issuance software

HSM Management and Monitoring

Cut operational costs, increase uptime, and improve efficiency by managing and overseeing your nShield HSMs from one location. Learn more about each product below.

The nShield Difference: Security World

Only nShield HSMs feature Security World, a specialized architecture that provides unmatched capabilities in several crucial areas:

Image
administrator settings icon

Full Control

Security World provides strong, granular controls over the access and usage of keys and policies.

Image
cloud with arrow up icon

Easier Backups

Unlike alternatives that require backup HSMs and labor-intensive HSM cloning, Security World enables simple, automated backups of HSM files.

Image
square expand icon

Scalability and Flexibility

Security World delivers unlimited key storage and the flexibility needed to align your HSM operations with your organization’s specific needs.

Image
wired network icon

Streamlined HSM Operations

nShield HSMs can be managed centrally based on unified policy and operational administration, no matter how many nShields you deploy.

Security World Architecture White Paper

Product Uses

Image
plum checkmark icon

Public Key Infrastructure

nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.

Image
plum checkmark icon

Code Signing

nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.

Image
plum checkmark icon

Digital Certificates

nShield HSMs create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

nShield Software Products

CodeSafe

Develop and execute sensitive code within a FIPS 140-2 Level 3 certified nShield hardware security module.

faded gray hex background

Software Option Packs

Software that extends the capability of your HSMs to fit your needs.

faded gray hex background

nShield Web Services Option Pack

Rely on a cloud-friendly REST-like interface for high-assurance nShield HSMs.

faded gray hex background

Time Stamping

We deliver secure, accurate time stamping that ensures integrity and traceability for digital records, code signing, transactions, logs, and more.

faded gray hex background

nShield Cloud Integration Option Pack

Use your nShield HSMs to generate, store, and manage the keys you count on to secure your sensitive cloud-hosted applications.

faded gray hex background

nShield Database Security Option Pack

Integrate with Microsoft SQL Server using Microsoft’s Extensible Key Management (EKM) API.

faded gray hex background

nShield Container Option Pack

Deploy containerized applications integrated with high-assurance FIPS 140-2 nShield HSMs with the nShield Container Option Pack (nCOP).

faded gray hex background