nSHIELD SOLO
nShield Solo
nShield Solo HSMs are hardened, tamper-resistant FIPS 140-2 certified PCIe cards which perform encryption, digital signing and key generation on behalf of an extensive range of commercial and custom-built applications, including certificate authorities, code signing and more.
nShield Solo Models
The nShield Solo series includes the new high-performance nShield Solo XC High, which offers superior asymmetric and symmetric performance and best-in-class elliptic curve cryptography (ECC) transaction rates.
nShield Solo Benefits
Our Security World architecture integrates nShield HSMs into a unified ecosystem, delivering scalability, load balancing, and more.
nShield Solo HSMs are ideal for enterprise retail, IoT, and other environments where throughput is critical.
Execute code within nShield boundaries, protecting your applications and the data they process.
Details
- Click to select...
Tech Specs
Certified Hardware Solutions
Entrust has earned a broad set of certifications for nShield products. These certifications help our customers to demonstrate compliance while also giving them the assurance that their nShield HSMs meet stringent industry standards.
Safety and Environmental Standards Compliance
- UL, CE, FCC, RCM, Canada ICES
- RoHS2, WEEE
Security Compliance
- eIDAS and Common Criteria EAL4 + AVA_VAN.5 and ALC_FLR.2 certification against EN 419 221-5 Protection Profile, under the Dutch NSCIB scheme
- Can form the basis of an EN 419 241-2 certified remote signing system for eIDAS.
- Compliant with BSI AIS 31 for true and deterministic random number generation
- ICP Brazil certification to NSC3 level
- Singapore CSA NITES certification for nShield Solo XC models
Supported APIs
- PKCS#11, OpenSSL, Java (JCE), Microsoft CAPI and CNG
Supported Cryptographic Algorithms
- Asymmetric public key algorithms: RSA, Diffie-Hellman, ECMQV, DSA, KCDSA, ECDSA, ECDH, Edwards (X25519, Ed25519ph)
- Symmetric algorithms: AES, AES-GCM, ARIA, Camellia, CAST, RIPEMD160 HMAC, SEED, Triple DES
- Hash/message digest: SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160
- Full Suite B implementation with fully licensed ECC, including Brainpool and custom curves
- Elliptic Curve Key Agreement (ECKA) available via Java API and nCore APIs
- Elliptic Curve Integrated Encryption Scheme (ECIES) available via Java API, PKCS#11 and nCore APIs
nShield HSMs offers the majority of these cryptographic algorithms as part of the standard feature set. For organizations wishing to use ECC or South Korean algorithms, optional activation licenses are needed.
Supported Platforms
Windows and Linux operating systems including distributions from RedHat, SUSE and major cloud service providers running as virtual machines or in containers.
Solo XC virtual environments supported including VMware ESX, Microsoft Hyper-V, Linux KVM & Citrix XenServer
High Transaction Rates
nShield HSMs boast high elliptic curve cryptography (ECC) and RSA transaction rates. ECC, one of the most efficient cryptographic algorithms, is particularly favored where low power consumption is crucial, such as applications running on small sensors or mobile devices.
Note 1: Performance indicated requires ECDSA fast RNG feature activation available free of charge on request from Entrust Support
Reliability
Calculated at 25°C operating temperature using Telcordia SR-332 “Reliability Prediction Procedure for Electronic Equipment" MTBF Standard.
- Solo XC 726,461 hours
Options and Accessories
Performance Ratings and Options
We have a variety of nShield Solo models to meet your performance needs. You can select among the performance models shown in the Tech Specs tab and can also purchase in-field upgrades from lower XC performance models to higher XC models.
Software Options packs
Entrust offer a range of software option packs which can be used in conjunction with your nShield HSMs.
nShield Monitor
nShield Monitor is a monitoring platform that provides 24x7 visibility into the status of payShield and nShield HSMs. With this solution, security teams can efficiently inspect HSMs and find out immediately if any potential security, configuration or utilization issue may compromise their mission-critical infrastructure.
Remote Administration Kits
nShield Remote Administration lets operators manage distributed nShield HSMs – including adding applications, upgrading firmware, checking status, re-booting and more – from their office locations, reducing travel and saving money. Remote Administration Kits contain the hardware and software needed to set up and use the tool. These kits are available for nShield Solo and nShield Connect HSMs.
CodeSafe
CodeSafe is a powerful, secure environment that lets you execute applications within the secure boundaries of nShield HSMs. Sample applications include digital meters, authentication agents, digital signature agents and custom encryption processes. CodeSafe is available with FIPS Level 3 certified network attached and PCIe nShield HSMs.
CipherTools
CipherTools is a set of tutorials, reference documentation, sample programs and additional libraries. With this toolkit, developers can take full advantage of the advanced integration capabilities of nShield HSMs. In addition to offering support for standard APIs, the toolkit enables you to run custom applications with nShield HSMs. CipherTools is included free of charge in the standard Security World software ISO/DVD.
Elliptic Curve Cryptography (ECC) Activation
The ECC activation license enables EC-DH, EC-DSA and EC-MQV to be used on an nShield HSMs.
KCDSA Activation
With the KCDSA activation license, you can use the Korean Certificate-based Digital Signature Algorithm (KCSDA) as well as HAS-160, SEED and ARIA algorithms on an nShield HSMs.
Smart Card Reader Rackmount
For organizations deploying one or more nShield Solo modules in a 19" rack, the optional nShield smart card reader rackmount provides a practical and clean solution for attaching card readers in the data center. The rackmount is 1U in height and can be equipped with up to four smart card readers, which come standard with nShield Solo cards. Each unit is packaged with three blanking plates to cover any unused slots.
Related Products
Reduce integration and gain simplicity using this API, providing a simple interface between cloud-based applications and HSMs.
Gain instantaneous 24/7 visibility of all your nShield HSMs from one centralized location.
Reduce travel time and costs by managing your geographically distributed nShield HSMs from…
FIPS-certified (Coordination Stage) hardware security appliances that deliver cryptographic services to a variety of applications across the network.
FIPS-certified (Coordination Stage), PCI-Express card-based solutions that deliver cryptographic services to applications hosted on individual servers and appliances.
Networked appliances that deliver cryptographic key services to applications distributed across servers and virtual machines.
USB-connected desktop HSMs that provide convenience and economy for environments requiring low-volume cryptographic key services.
What our customers are saying...
Square
We have a long history together and we’re extremely comfortable continuing to rely on Entrust solutions for the core of our business. We have used Entrust HSMs for five years and they have always been exceptionally reliable. We’ve layered a lot of code on top of the HSM; it delivers the performance we need and has proven to be a rock-solid foundation.
Verifone
As a global payment solutions and commerce enablement leader, Verifone’s strategy is to develop and deploy “best in class” payment solutions and services that meet or exceed global security standards and help our clients securely accept electronic payments across all channels of commerce. We selected Entrust HSMs to provide robust security, unmatched performance, and superior scalability across our payment security platforms…
Memjet
The Entrust nShield sales team provided excellent local and remote support during this evaluation period and was invaluable to the process. The excellent depth, breadth, and quality of the product documentation gave us confidence that the solution was well thought-out and supported.
Polycom
Entrust provided the expertise needed to design and implement a tailored, secure VoIP solution.