Entrust

Entrust HSMs – Maximum security for your cryptographic infrastructure. Trustworthy. Scalable. Future-proof.

Entrust nShield HSMs offer enterprise-level security , whether you’re protecting critical databases, cloud services, payment infrastructures, or PKI systems. The nShield 5c delivers maximum performance, flexibility, and compliance, while the broad HSM family ensures that the right device is available for every architecture: on-premises, as a network appliance, portable USB devices, or as a cloud service.


nShield 5c – High-Performance HSM for Enterprises

Entrust HSM nShield 5c
Entrust HSM nShield 5c

The nShield 5c is the flagship of the Entrust HSM series. It combines performance, scalability, and the highest level of security in a network HSM designed for demanding enterprise applications.

Technical highlights:

  • Certified security: FIPS 140-3 Level 3, Common Criteria EAL4+, tamper-evident
  • Scalable performance: Parallelized cryptography for thousands of transactions per second
  • Crypto-agility: Support for RSA, ECC, AES, SHA-3 and future post-quantum algorithms
  • Network integration: Deployment via high-bandwidth LAN, remote management and failover options
  • Redundancy & High Availability: Cluster-capable for uninterrupted services

Use Cases:

  • PKI servers and certificate infrastructures
  • Code signing and software authentication
  • Encryption of sensitive databases and applications
  • Protection of authentication systems and payment infrastructures

Other Entrust HSM variants

nShield 5s – PCIe HSM

Entrust HSM nShield 5s
Entrust HSM nShield 5s
  • Embedded in servers, ideal for local high-performance cryptography
  • Perfect for code signing, database encryption and PKI servers

nShield Edge – tragbare USB-HSM

Entrust HSM nShield Edge
Entrust HSM nShield Edge
  • Compact, mobile and easy to use
  • Protects keys in development, BYOK, or cloud scenarios.

nShield as a Service (nSaaS)

nShield as a Service (nSaaS)
nShield as a Service (nSaaS)
  • Cloud-based, no hardware required
  • Ideal for rapid deployment of cryptographic services in hybrid infrastructures

Why choose Entrust HSMs?

  • Physically secured keys: Never leave unprotected outside the HSM device.
  • Highly scalable: For growing transaction and key volume requirements
  • Flexible integration: On-premise, network, USB or cloud – always compatible
  • Future-proof: Supports current and future algorithms (post-quantum-ready)
  • Central administration: Monitoring, role and authorization management, remote administration

Entrust PKI Solution – The backbone of digital security. Post-Quantum Ready.

Entrust offers a fully integrated Public Key Infrastructure that automates the entire certificate lifecycle – from key generation and issuance to management, renewal, and secure revocation. The platform enables end-to-end security for digital certificates, keys, and device identities in complex IT environments and supports modern Zero Trust and DevOps architectures.


PKI portfolio

1. PKI as a Service (PKIaaS)

  • Cloud-native architecture: Multi-tenant, elastic scaling, global availability
  • Automated Lifecycle Management: Issue, Renew, Revoke, Suspend, Expire
  • APIs & Integrations: REST, CMPv2, SCEP, EST, ACME protocols for DevOps and IoT use cases
  • Post-quantum cryptography: Supporting hybrid keys to prepare for future quantum attacks
  • High Availability & Disaster Recovery: Geo-redundant clusters, SLA-guaranteed uptime

Use Case: Companies that need scalable PKI for cloud-first environments and DevOps.


PKI-Portfolio

1. PKI as a Service (PKIaaS)

  • Cloud-native Architektur: Multi-Tenant, elastische Skalierung, globale Verfügbarkeit
  • Automatisiertes Lifecycle Management: Issue, Renew, Revoke, Suspend, Expire
  • APIs & Integrationen: REST, CMPv2, SCEP, EST, ACME-Protokolle für DevOps- und IoT-Use-Cases
  • Post-Quantum-Kryptografie: Unterstützung hybrider Schlüssel zur Vorbereitung auf zukünftige Quantenangriffe
  • High Availability & Disaster Recovery: Geo-redundante Cluster, SLA-garantierte Uptime

Use Case: Unternehmen, die skalierbare PKI für Cloud-First-Umgebungen und DevOps benötigen.


2. Cryptographic Security Platform (CSP) PKI

Entrust PKI Kompatibilität mit Umsystemen
Entrust PKI compatibility with external systems

  • All-in-One Appliance: PKI components (Root/Intermediate CAs, RA, OCSP, CRL) in a virtualized platform
  • On-premise or private cloud: Full control over key material and certificate management
  • Integration with HSMs: FIPS 140-3 Level 3 certified HSMs for private keys
  • Scalability: Issuing certificates worth millions with low-latency performance

Use Case: Organizations with strict compliance requirements and high security standards, e.g., financial or government institutions.


3. Managed PKI Services

  • Entrust as operator: monitoring, updates, key management, compliance checks
  • Audit & Reporting: Full logging of CA operations, CRL and OCSP status
  • Automated certificate processes: Reducing human error and ensuring SLA-compliant renewal

Use Case: Companies without an internal PKI team that still require the highest level of security.


4. Certificate Authority (Enterprise PKI)

  • Centralized management of root and sub-CAs
  • Support for HSM-secured keys (FIPS 140-2/3 Level 3)
  • Protocol support: REST, CMPv2, SCEP, EST, ACME, OCSP, CRL
  • Certificate types: TLS/SSL, Client Auth, Code Signing, Document Signing, IoT Device Identity
  • Global standards: CAB/FORUM, Common Criteria, ISO 27001

Use Case: Large companies, IoT ecosystems, banks, government agencies, software manufacturers.


Technical Highlights

  • Post-Quantum-Ready Algorithms: Hybrid and Quantum-Resistant Keys
  • End-to-End Key Management: HSM-secured root keys, lifecycle management, automated renewal
  • Flexible deployment: Cloud-native PKIaaS, on-prem appliance, managed service
  • API integration: Automation for DevOps, IoT, MDM/EMM systems
  • Zero Trust compatible: Certificates for encrypted device-to-device and service communication

Deployment scenarios

  • Web and service security: TLS/SSL certificates, API protection
  • IoT & Embedded Devices: Trusted Device Identity, Secure Boot
  • Code Signing: Software Integrity and Non-Repudiation
  • Digital signatures: Email, documents, PDFs
  • Zero-Trust Networks: Authentication of users, endpoints and services

Fragen oder Kommentare?
Rufen Sie uns an!

Cedric Simmert
Sales Manager
Tel +41 58 311 1035