Toggle Nav

Entrust nShield Edge HSMs

In stock
SKU:
nShield Edge HSMs
  • 24×7 remote and on-site support
  • Multi-vendor solutions & services
  • Local billing in 33+ countries
  • Competitive Price

Powerful, portable cryptographic services
The nShield Edge hardware security module (HSM) is a full-featured, portable USB HSM designed for low-volume transaction environments. It’s capable of encryption and key protection and is ideally suited for off-line key generation for certificate authorities (CAs) as well as development and Bring Your Own Key (BYOK) environments.

  • Maximizes cost efficiency. nShield Edge is the most economical HSM in the nShield family
  • Supports a wide variety of applications including certificate authorities, code signing, and more
  • Delivers strong security. nShield Edge HSMs are certified up to FIPS 140-2 Level 3

Designed for low-volume transaction environments
Suits off-line key generation and development environments, while delivering complete algorithm and API support. Ideal for Bring Your Own Key (BYOK) deployments requiring the generation of cryptographic keys with FIPS 140-2 level assurance prior to securely exporting them to the cloud.

Highly portable
Small, lightweight design with convenient USB interface supports a variety of platforms, including laptops and other portable devices.

Cost effective and scalable
The most economical HSM in the nShield family, nShield Edge gives you an entrypoint HSM, while affording you the option to scale your environment as your needs grow. Entrust’s unique Security World architecture lets you combine nShield HSM models to build a mixed estate that delivers flexible scalability, key sharing, seamless failover and load balancing.

Certifications

nShield Edge USB HSMs are certified to FIPS 140-2 Level 2 and Level 3.

Safety and Environmental Standards Compliance

  • UL, CE, FCC, RCM, Canada ICES
  • RoHS2, WEEE

Supported APIs

  • PKCS#11, OpenSSL, Java (JCE), Microsoft CAPI and CNG

Supported Cryptographic Algorithms

  • Asymmetric public key algorithms: RSA, Diffie-Hellman, ECMQV, DSA, KCDSA, ECDSA, ECDH, Edwards (X25519, Ed25519ph)
  • Symmetric algorithms: AES, AES-GCM, ARIA, Camellia, CAST, RIPEMD160 HMAC, SEED, Triple DES
  • Hash/message digest: SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160
  • Full Suite B implementation with fully licensed ECC, including Brainpool and custom curves
  • Elliptic Curve Key Agreement (ECKA) available via Java API and nCore APIs
  • Elliptic Curve Integrated Encryption Scheme (ECIES) available via Java API, PKCS#11 and nCore APIs

nShield HSMs offers the majority of these cryptographic algorithms as part of the standard feature set. For organizations wishing to use ECC or South Korean algorithms, optional activation licenses are needed.

Operating Systems

Windows and Linux operating systems including distributions from RedHat and SUSE.

Custom Solutions
Competative Prices
Global Logistics
24*7*365 Support