Hardware Security Modules (HSM)
DATA SECURITY STARTS HERE

General Purpose HSMs
Protect and manage keys in high-assurance hardware.
HSM Management and Monitoring
Enable secure remote access and control of your HSMs.


nShield Software Products
Expand the functionality of your HSM.
View the nShield Family of General Purpose HSMs
Networked appliances that deliver cryptographic key services to applications distributed across servers and virtual machines.
[/mvc_flip_box]
Certified hardware designed to deliver scalable cryptographic services for issuance software.
[/mvc_flip_box]
PCI-Express card-based HSMs that deliver cryptographic key services to applications hosted on individual servers and appliances.
[/mvc_flip_box]
USB-connected desktop HSMs that provide convenience and economy for environments requiring low-volume cryptographic key services.
[/mvc_flip_box]
Subscription-based service for generating, accessing and protecting cryptographic keys with dedicated FIPS 140-2-certified nShield Connect HSMs.
[/mvc_flip_box]
HSM Management and Monitoring

nShield Monitor
Great HSM oversight with one window
nShield Monitor is a comprehensive HSM monitoring platform that enables operations teams to gain 24×7 visibility into the status of all their nShield HSMs, including those residing across distributed data centers. With this solution, security teams can efficiently inspect HSMs and find out immediately if any potential security, configuration or utilization issue may compromise their mission-critical infrastructure.
nShield Remote Administration
Control your HSMs from anywhere
nShield HSMs often run in physically secure, lights-out data centers in locations far from the people who manage them. nShield Remote Administration lets you manage your HSMs – including adding applications, upgrading firmware, and checking status – wherever and whenever you choose. This means less travel to data centers, helping you cut costs and optimize your resources.

nShield Software Products

Codesafe
Maximize application security
The CodeSafe software developer toolkit provides the capability to create and execute sensitive applications within the protected perimeter of a FIPS 140-2 Level 3 certified nShield hardware security module (HSM).
Software Option Packs
Software that extends the capability of your HSMs to fit your needs.
Entrust nShield Software Option Packs are easy to set up and deploy, delivering everything you need to integrate high assurance nShield HSMs into your preferred environment. Our software option packs include:
Web Services
nShield Container
Time Stamping
Cloud Integration
Database Security


nShield Web Services Option Pack
Enable functions through simple web service interfaces
The nShield Web Services Option Pack (WSOP) provides a REST-like API between applications requiring cryptographic key and data protection services and FIPS-certified nShield HSMs. nShield HSMs perform a variety of cryptographic functions like encryption, signing, and key generation.
nShield Time Stamping Option Pack
Accurate and integral
Digital time stamping is integral to an organization’s ability to verify data and code integrity, generate audit trails and enforce non-repudiation for electronic signatures. Entrust delivers a secure, high-assurance time-stamping solution that is protected by the nShield Solo+ HSMs. The time stamping solution automates records processing and supports a diverse array of applications.


nShield Cloud Integration Option Pack
Take Your Keys to the Cloud
The Cloud Integration Option Pack (CIOP) lets cloud service users generate keys in their own environment and export them for use in the cloud while having confidence that their key has been generated securely using a strong entropy source and the long-term storage of their key is protected by a FIPS-certified HSM. Supported cloud services include Amazon Web Services (AWS), Google Compute Engine, Microsoft Azure and Salesforce.
nShield Database Security Option Pack
Defend your database
The nShield Database Security Option Pack allows nShield hardware security modules (HSMs) to seamlessly integrate with Microsoft SQL Server. Encrypting the data in your database protects the data, but the encryption keys that unlock the data must also be protected. The use of HSMs safeguards encryption keys by storing them separately from the data on a secure, trusted platform.


nShield Container Option Pack
Secure, containerized deployment
Containerized applications can be hard to integrate with high-assurance hardware security modules. When the time from staging to production is critical, you need a proven deployment model and scripts that reduce the overall dev cycle. nCOP makes it easy to build HSM support into containerized solutions and provides a template deployment model without the worry of HSM integration.
Our Hardware Security Module Products
nShield delivers the industry’s most comprehensive and advanced hardware security modules

Compliance
Satisfy widely recognized government and industry mandates for financial, healthcare and other sensitive data

Accelerate Digital Transformation
Establish trust throughout the data landscape so you can confidently and safely embrace digital transformation



