Hardware Security Module
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.
nShield general purpose HSMs from Thales provide support for the widest range of cryptographic algorithms, application programming interfaces (APIs) and host operating systems, enabling the devices to be used with virtually any business application from identity management, web services and database encryption to tokenization, PKI services and strong authentication. The nShield HSM product line is pre-tested to integrate with a wide range of commercial security solutions from partners such as Microsoft. All nShield HSMs feature Thales market-leading Security World key management architecture proven technology that protects application keys within the safe confines of the HSM, yet allows them to be managed in a straightforward and convenient manner, delivering an ideal combination of high assurance and operational ease. nShield HSMs substantially reduce the risk of human administrative error while guaranteeing key recovery and eliminating single points of failure. Most nShield HSMs also support the unique ability to host critical application software within the hardened security boundary, so you can establish tamper-resistant business processes in addition to protecting cryptographic operations.
For more than 20 years, products in the Datacryptor network encryption family from Thales e-Security have helped businesses and government organizations achieve their goals for secure, affordable, and high-performance end-to-end connectivity. Delivering a broad range of high-speed, high-bandwidth platforms for IP network encryption (IPsec), Link & Layer 2 encryption, and High Grade Government encryption, the Datacryptor line is designed specifically to secure data in motion with minimal latency for mission-critical and business-critical applications. Utilizing high assurance encryption methods and state-of-the-art key management techniques, the standalone Datacryptor devices encrypt data securely while offering significantly lower latency than software encryption capabilities embedded in common network devices such as switches and routers. By delivering an ideal blend of security and performance, Datacryptor products make it possible for organizations to utilize the most cost-effective data transport medium available, while also meeting or exceeding business and regulatory requirements for data privacy and confidentiality. Choose from a range of Datacryptor models, selecting those that match your network protocol, speed, certification, and customization requirements. Specifically designed to ease maintenance and minimize cost of ownership, Datacryptor products have achieved certifications including FIPS, Common Criteria, the UK government CAPS (CESG Assisted Products Service) standards, NATO approvals, and listing on the U.S. Defense Information Systems Agencys Unified Capabilities Approved Products List (DISA UCAPL).