Skip to main content
man and woman on laptop on server room

nShield general purpose HSMs

nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption, key management and more. nShield hardware security modules are available in three FIPS 140-2 certified form factors and support a variety of deployment scenarios.

Download our nShield Brochure to learn more.

The nShield Difference: Security World

Only nShield HSMs feature Security World, a specialized architecture that provides unmatched capabilities in several crucial areas:

settings icon in hex shape orange
Full Control

Security World provides strong, granular controls over the access and usage of keys and policies.

Cloud Backup
Easier Backups

Unlike alternatives that require backup HSMs and labor-intensive HSM cloning, Security World enables simple, automated backups of HSM files.

enlarge icon in hex shape purple
Scalability and Flexibility

Security World delivers unlimited key storage and the flexibility needed to align your HSM operations with your organization’s specific needs.

network icon
Streamlined HSM Operations

nShield HSMs can be managed centrally based on unified policy and operational administration, no matter how many nShields you deploy.

Security World Architecture white paper
Beyond Security

Unique nShield Benefits

Powerful Architecture
Powerful Architecture

Combine nShield HSM models to build a unified ecosystem that delivers scalability, seamless failover and load balancing.

Performance and Versability icon
Performance and Versatility

Three models with multiple performance tiers, including a wide range of elliptic curve cryptography (ECC) options that deliver industry-leading transaction rates.

Laptop and Mobile icon
Applications and Data Protection

The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.

Details

  • Click to select...

Product Uses

Public Key Infrastructure

  • nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.

Code Signing

  • nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.

Digital Certificates

  • nShield HSMs create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

    View the nShield Family of General Purpose HSMs

    What our customers are saying...

    Square logo
    Square
    Verifone logo
    Verifone
    Memjet logo
    Memjet
    Polycom logo
    Polycom

    Square

    We have a long history together and we’re extremely comfortable continuing to rely on Entrust solutions for the core of our business. We have used Entrust HSMs for five years and they have always been exceptionally reliable. We’ve layered a lot of code on top of the HSM; it delivers the performance we need and has proven to be a rock-solid foundation.

    Neal Harris, Security Engineering Manager, Square, Inc

    Verifone

    As a global payment solutions and commerce enablement leader, Verifone’s strategy is to develop and deploy “best in class” payment solutions and services that meet or exceed global security standards and help our clients securely accept electronic payments across all channels of commerce. We selected Entrust HSMs to provide robust security, unmatched performance, and superior scalability across our payment security platforms…

    Joe Majka, Chief Security Officer, Verifone

    Memjet

    The Entrust nShield sales team provided excellent local and remote support during this evaluation period and was invaluable to the process. The excellent depth, breadth, and quality of the product documentation gave us confidence that the solution was well thought-out and supported.

    Robert Fairlie-Cuninghame, QAI Technical Lead/Architect, Memjet

    Polycom

    Entrust provided the expertise needed to design and implement a tailored, secure VoIP solution.

    Marek Dutkiewicz, Polycom

    Resources