Entrust (previously nCipher)

Entrust is a global leader in trusted identity, payments and data protection, and acquired nCipher Security in June 2019. In Cambridge, we develop the world-leading nShield hardware security modules (HSMs), empowering security conscious organisations by delivering trust, integrity and control to their business critical information and applications.

Entrust keeps the world moving safely by enabling trusted identities, payments and data protection. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us. For more information, visit www.entrust.com.

 


Products and services

Cloud bring your own key (BYOK)

Bring your own keys to your cloud applications, whether you’re using Amazon Web Services (AWS), Google Cloud Platform (GCP) or Microsoft Azure.

Bring your own keys to your cloud applications, whether you’re using Amazon Web Services (AWS), Google Cloud Platform (GCP) or Microsoft Azure. nShield high-assurance HSMs let you continue to benefit from the flexibility and economy of cloud services while you strengthen the security of your key management practices and gain greater control over your keys.

Find out more

Digital signing solutions

Digital signatures provide verification of the authenticity and integrity of proprietary application code, legal documents, financial records, etc. nShield HSMs integrate with your applications to generate keys, and sign and time stamp your digital assets, so they can be authenticated by their recipients in a secure and auditable fashion.

Security

nCipher solutions perform key generation and signing services within the boundaries of FIPS 140-2 Level 2 and 3 certified nShield HSMs.

Versatility

nShield HSM solutions deliver flexible digital signing capabilities that can address diverse deployment scenarios, offering support for a range of industry-standard APIs, encryption algorithms and operating systems.

Ease of deployment

Our digital signing offerings are integrated with nShield HSMs and our unique Security World architecture. With Security World, you can combine different nShield HSM models to build a unified ecosystem that delivers scalability, seamless failover and load balancing.

Public key infrastructures (PKIs)

nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.

Code signing

nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.

Trust services

Recognized under EU regulations as Qualified Signature Creation Devices (QSCDs), nShield HSMs are used by solution providers to deliver remote and digital signing solutions for cross-border transactions, electronic IDs, and other trust services.

Find out more

Centralized HSM monitoring and management

In today's environment of distributed IT solutions, hardware security modules (HSMs)—which safeguard a company's encryption keys—are often housed in remote data centers, making HSM management challenging and making it costly to access information about this

nCipher offers nShield HSMs management and monitoring tools that help you optimize your resources while improving uptime—saving you time and money. nCipher offers nShield Remote Administration, to manage your off-site HSMs, and nShield Monitor, to stay informed about your HSM estate.

Reduce operational costs

nCipher’s nShield management and monitoring tools save money and reduce staff travel time by eliminating visits to data centers to manage and collect data from your HSMs.

Increase uptime

HSM management tools give you instantaneous visibility and 24x7 access to your hardware security modules (HSMs) give you the information you need to act immediately on warnings and alerts.

Improve efficiency

Plan HSM loading and capacity, maintenance, upgrades and more using historical trend data.

Find out more

nShield general purpose hardware security modules (HSMs)

nShield hardware security modules (HSMs) provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, nShield HSMs support a variety of deployment scenarios.

nCipher Security’s nShield HSMs are hardened, tamper-resistant devices that protect your company’s most sensitive data. These FIPS 140-2 certified modules perform cryptographic functions such as generating, managing and storing encryption and signing keys, as well as executing sensitive functions within their protected boundaries.

A powerful addition to your security stack, nShield HSMs help you to:

  • Achieve higher levels of data security and trust
  • Meet and exceed important regulatory standards
  • Maintain high service levels and business agility

Powerful architecture

All nShield HSMs integrate with the unique Security World architecture from nCipher. With this proven technology, you can combine different nShield HSM models to build a unified ecosystem that delivers scalability, seamless failover and load balancing.

Performance and versatility

With nShield HSMs, you only buy what you need to meet your specific performance requirements. nShield Connect and Solo are available in three models that offer varying levels of performance, including a wide range of ECC options that deliver industry-leading transaction rates.

Protect your business critical applications and data

nShield Connect and Solo HSMs don’t just protect your sensitive keys and data; they also provide a secure environment for running sensitive applications. The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.

Public Key Infrastructures

nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for public key infrastructures (PKIs) across a variety of use cases.

Code Signing

nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.

Digital Certificates

nShield HSMs create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

 

Find out more

Stay up to date with Entrust (previously nCipher)

Login or create a free user account to follow this company and see updates on your dashboard.

Create account