{"id":606,"date":"2020-07-18T14:16:05","date_gmt":"2020-07-18T14:16:05","guid":{"rendered":"https:\/\/ergonomics.aryxe.tech\/?page_id=606"},"modified":"2026-02-18T15:05:07","modified_gmt":"2026-02-18T13:05:07","slug":"entrust","status":"publish","type":"page","link":"https:\/\/www.ergonomics.ch\/en\/products\/entrust\/","title":{"rendered":"Entrust"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"wp-block-heading\">Entrust HSMs \u2013 Maximum security for your cryptographic infrastructure. Trustworthy. Scalable. Future-proof.<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img decoding=\"async\" src=\"https:\/\/ergonomicsit.com\/wp-content\/uploads\/2025\/12\/Entrust_logo.svg_.png\" alt=\"\" class=\"wp-image-4455\"\/><\/figure><\/div>\n\n\n<p>Entrust nShield HSMs offer enterprise-level security , whether you&#8217;re protecting critical databases, cloud services, payment infrastructures, or PKI systems. The nShield 5c delivers maximum performance, flexibility, and compliance, while the broad HSM family ensures that the right device is available for every architecture: on-premises, as a network appliance, portable USB devices, or as a cloud service.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">nShield 5c \u2013 High-Performance HSM for Enterprises<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"330\" src=\"https:\/\/www.ergonomics.ch\/wp-content\/uploads\/2025\/12\/nShield-Connect.png\" alt=\"\" class=\"wp-image-4432\" style=\"width:400px\" srcset=\"https:\/\/www.ergonomics.ch\/wp-content\/uploads\/2025\/12\/nShield-Connect.png 800w, https:\/\/www.ergonomics.ch\/wp-content\/uploads\/2025\/12\/nShield-Connect-768x317.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">Entrust HSM nShield 5c<\/figcaption><\/figure><\/div>\n\n\n<p>The <strong>nShield 5c<\/strong> is the flagship of the Entrust HSM series. It combines <strong>performance, scalability, and the highest level of security<\/strong> in a network HSM designed for demanding enterprise applications.<\/p>\n\n\n\n<p><strong>Technical highlights:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Certified security:<\/strong> FIPS 140-3 Level 3, Common Criteria EAL4+, tamper-evident<\/li>\n\n\n\n<li><strong>Scalable performance:<\/strong> Parallelized cryptography for thousands of transactions per second<\/li>\n\n\n\n<li><strong>Crypto-agility:<\/strong> Support for RSA, ECC, AES, SHA-3 and future post-quantum algorithms<\/li>\n\n\n\n<li><strong>Network integration:<\/strong> Deployment via high-bandwidth LAN, remote management and failover options<\/li>\n\n\n\n<li><strong>Redundancy &amp; High Availability:<\/strong> Cluster-capable for uninterrupted services<\/li>\n<\/ul>\n\n\n\n<p><strong>Use Cases:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PKI servers and certificate infrastructures<\/li>\n\n\n\n<li>Code signing and software authentication<\/li>\n\n\n\n<li>Encryption of sensitive databases and applications<\/li>\n\n\n\n<li>Protection of authentication systems and payment infrastructures<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Other Entrust HSM variants<\/h3>\n\n\n\n<p><strong>nShield 5s \u2013 PCIe HSM<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.ergonomics.ch\/wp-content\/uploads\/2025\/12\/Entrust-nShield-5s.png\" alt=\"\" class=\"wp-image-4429\" style=\"width:400px\" srcset=\"https:\/\/www.ergonomics.ch\/wp-content\/uploads\/2025\/12\/Entrust-nShield-5s.png 800w, https:\/\/www.ergonomics.ch\/wp-content\/uploads\/2025\/12\/Entrust-nShield-5s-300x300.png 300w, https:\/\/www.ergonomics.ch\/wp-content\/uploads\/2025\/12\/Entrust-nShield-5s-768x768.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">Entrust HSM nShield 5s<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Embedded in servers, ideal for <strong>local high-performance cryptography<\/strong><\/li>\n\n\n\n<li>Perfect for <strong>code signing, database encryption and PKI servers<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p><strong>nShield Edge \u2013 tragbare USB-HSM<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/ergonomicsit.com\/wp-content\/uploads\/2025\/12\/nShield-Edge.png\" alt=\"Entrust HSM nShield Edge\" class=\"wp-image-4576\" style=\"width:400px\"\/><figcaption class=\"wp-element-caption\">Entrust HSM nShield Edge<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Compact, mobile and easy to use<\/li>\n\n\n\n<li>Protects keys in <strong>development, BYOK, or cloud scenarios.<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p><strong>nShield as a Service (nSaaS)<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/ergonomicsit.com\/wp-content\/uploads\/2025\/12\/nShiled-as-a-Service.png\" alt=\"nShield as a Service (nSaaS)\" class=\"wp-image-4577\" style=\"width:400px\"\/><figcaption class=\"wp-element-caption\">nShield as a Service (nSaaS)<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Cloud-based, no hardware required<\/li>\n\n\n\n<li>Ideal for <strong>rapid deployment of cryptographic services<\/strong> in hybrid infrastructures<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Why choose Entrust HSMs?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Physically secured keys:<\/strong> Never leave unprotected outside the HSM device.<\/li>\n\n\n\n<li><strong>Highly scalable:<\/strong> For growing transaction and key volume requirements<\/li>\n\n\n\n<li><strong>Flexible integration:<\/strong> On-premise, network, USB or cloud \u2013 always compatible<\/li>\n\n\n\n<li><strong>Future-proof:<\/strong> Supports current and future algorithms (post-quantum-ready)<\/li>\n\n\n\n<li><strong>Central administration:<\/strong> Monitoring, role and authorization management, remote administration<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Entrust PKI Solution \u2013 The backbone of digital security. Post-Quantum Ready.<\/h2>\n\n\n\n<p><strong>Entrust offers a fully integrated Public Key Infrastructure that automates the entire certificate lifecycle \u2013 from key generation and issuance to management, renewal, and secure revocation. The platform enables end-to-end security for digital certificates, keys, and device identities in complex IT environments and supports modern Zero Trust and DevOps architectures.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">PKI portfolio<\/h2>\n\n\n\n<p><strong>1. PKI as a Service (PKIaaS)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cloud-native architecture: Multi-tenant, elastic scaling, global availability<\/li>\n\n\n\n<li>Automated Lifecycle Management: Issue, Renew, Revoke, Suspend, Expire<\/li>\n\n\n\n<li>APIs &amp; Integrations: REST, CMPv2, SCEP, EST, ACME protocols for DevOps and IoT use cases<\/li>\n\n\n\n<li>Post-quantum cryptography: Supporting hybrid keys to prepare for future quantum attacks<\/li>\n\n\n\n<li>High Availability &amp; Disaster Recovery: Geo-redundant clusters, SLA-guaranteed uptime<\/li>\n<\/ul>\n\n\n\n<p><strong>Use Case:<\/strong> Companies that need scalable PKI for cloud-first environments and DevOps.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">PKI-Portfolio<\/h2>\n\n\n\n<p><strong>1. PKI as a Service (PKIaaS)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cloud-native Architektur: Multi-Tenant, elastische Skalierung, globale Verf\u00fcgbarkeit<\/li>\n\n\n\n<li>Automatisiertes Lifecycle Management: Issue, Renew, Revoke, Suspend, Expire<\/li>\n\n\n\n<li>APIs &amp; Integrationen: REST, CMPv2, SCEP, EST, ACME-Protokolle f\u00fcr DevOps- und IoT-Use-Cases<\/li>\n\n\n\n<li>Post-Quantum-Kryptografie: Unterst\u00fctzung hybrider Schl\u00fcssel zur Vorbereitung auf zuk\u00fcnftige Quantenangriffe<\/li>\n\n\n\n<li>High Availability &amp; Disaster Recovery: Geo-redundante Cluster, SLA-garantierte Uptime<\/li>\n<\/ul>\n\n\n\n<p><strong>Use Case: <\/strong>Unternehmen, die skalierbare PKI f\u00fcr Cloud-First-Umgebungen und DevOps ben\u00f6tigen.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p><strong>2. Cryptographic Security Platform (CSP) PKI<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/ergonomicsit.com\/wp-content\/uploads\/2025\/12\/Trusted-PKI-Software-Solutions-Provider-800x533-1.png\" alt=\"Entrust PKI Kompatibilit\u00e4t mit Umsystemen\" class=\"wp-image-4640\" style=\"object-fit:cover\"\/><figcaption class=\"wp-element-caption\">Entrust PKI compatibility with external systems<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>All-in-One Appliance: PKI components (Root\/Intermediate CAs, RA, OCSP, CRL) in a virtualized platform<\/li>\n\n\n\n<li>On-premise or private cloud: Full control over key material and certificate management<\/li>\n\n\n\n<li>Integration with HSMs: FIPS 140-3 Level 3 certified HSMs for private keys<\/li>\n\n\n\n<li>Scalability: Issuing certificates worth millions with low-latency performance<\/li>\n<\/ul>\n\n\n\n<p><strong>Use Case:<\/strong> Organizations with strict compliance requirements and high security standards, e.g., financial or government institutions.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p><strong>3. Managed PKI Services<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Entrust as operator: monitoring, updates, key management, compliance checks<\/li>\n\n\n\n<li>Audit &amp; Reporting: Full logging of CA operations, CRL and OCSP status<\/li>\n\n\n\n<li>Automated certificate processes: Reducing human error and ensuring SLA-compliant renewal<\/li>\n<\/ul>\n\n\n\n<p><strong>Use Case:<\/strong> Companies without an internal PKI team that still require the highest level of security.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p><strong>4. Certificate Authority (Enterprise PKI)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Centralized management of root and sub-CAs<\/li>\n\n\n\n<li>Support for HSM-secured keys (FIPS 140-2\/3 Level 3)<\/li>\n\n\n\n<li>Protocol support: REST, CMPv2, SCEP, EST, ACME, OCSP, CRL<\/li>\n\n\n\n<li>Certificate types: TLS\/SSL, Client Auth, Code Signing, Document Signing, IoT Device Identity<\/li>\n\n\n\n<li>Global standards: CAB\/FORUM, Common Criteria, ISO 27001<\/li>\n<\/ul>\n\n\n\n<p><strong>Use Case:<\/strong> Large companies, IoT ecosystems, banks, government agencies, software manufacturers.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p><strong>Technical Highlights<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Post-Quantum-Ready Algorithms: Hybrid and Quantum-Resistant Keys<\/li>\n\n\n\n<li>End-to-End Key Management: HSM-secured root keys, lifecycle management, automated renewal<\/li>\n\n\n\n<li>Flexible deployment: Cloud-native PKIaaS, on-prem appliance, managed service<\/li>\n\n\n\n<li>API integration: Automation for DevOps, IoT, MDM\/EMM systems<\/li>\n\n\n\n<li>Zero Trust compatible: Certificates for encrypted device-to-device and service communication<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p><strong>Deployment scenarios<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Web and service security: TLS\/SSL certificates, API protection<\/li>\n\n\n\n<li>IoT &amp; Embedded Devices: Trusted Device Identity, Secure Boot<\/li>\n\n\n\n<li>Code Signing: Software Integrity and Non-Repudiation<\/li>\n\n\n\n<li>Digital signatures: Email, documents, PDFs<\/li>\n\n\n\n<li>Zero-Trust Networks: Authentication of users, endpoints and services<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Entrust HSMs \u2013 Maximum security for your cryptographic infrastructure. Trustworthy. Scalable. Future-proof. Entrust nShield HSMs offer enterprise-level security , whether you&#8217;re protecting critical databases, cloud services, payment infrastructures, or PKI systems. The nShield 5c delivers maximum performance, flexibility, and compliance, while the broad HSM family ensures that the right device is available for every architecture: [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1017,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-product.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-606","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.1","language":"en","enabled_languages":["de","en"],"languages":{"de":{"title":true,"content":true,"excerpt":false},"en":{"title":true,"content":true,"excerpt":false}}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages\/606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/comments?post=606"}],"version-history":[{"count":43,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages\/606\/revisions"}],"predecessor-version":[{"id":4896,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages\/606\/revisions\/4896"}],"up":[{"embeddable":true,"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/pages\/1017"}],"wp:attachment":[{"href":"https:\/\/www.ergonomics.ch\/en\/wp-json\/wp\/v2\/media?parent=606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}