Protection
Keep keys out of software
Generate, store, and use sensitive keys inside dedicated hardware boundaries to reduce extraction and misuse risk.
Entrust nShield HSMs protect cryptographic keys and operations in tamper-resistant hardware for use cases such as certificate authorities, digital signing, code signing, encryption, payment systems, and custom applications.
iTrust helps choose the right HSM model, integrate applications, define key ceremonies, and create operational controls for secure key management.
Protection
Generate, store, and use sensitive keys inside dedicated hardware boundaries to reduce extraction and misuse risk.
Performance
Use HSMs for signing, encryption, key generation, CA operations, transaction systems, and high-throughput application services.
Compliance
Support audit and regulatory needs with certified platforms, controlled administration, and clear operational procedures.
Resources
Official Entrust resources for nShield HSM evaluation.
Datasheet
Datasheet for nShield 5s HSMs, including post-quantum support, remote administration, Security World architecture, CodeSafe, and performance models.
Product Page
Product page covering PCIe HSM capabilities, certifications, APIs, algorithms, supported platforms, and performance data.