Where are your cryptographic keys? Using HSMs to secure keys that secure data

Logo
Presented by

Iain Beveridge - Product Marketing Manager, Entrust

About this talk

Cryptographic keys are some of your organization’s most precious assets. The value of any key is equivalent to the value of all the data it protects. If a key is compromised it’s game over! Attackers trying to hack systems can easily find cryptographic keys maintained in software. A single stolen or misallocated key could lead to a huge data breach with the consequential reputational damage, penal regulatory fines, and loss of investor and customer confidence. When using HSMs to protect these keys, you add a robust layer of security, preventing attackers from finding them. nShield HSMs are specially designed to establish a root of trust, safeguarding and managing cryptographic keys and processes within a certified hardware environment. nShield HSMs, offered as an appliance deployed at an on-premises data center or leased through an as-a-service subscription, provide enhanced key generation, signing, and encryption to protect sensitive data and transactions. Watch this 20 minute on-demand session to learn about how nShield HSMs help you: • Achieve compliance - Meet and exceed widely recognized government and industry mandates for financial, healthcare and other sensitive data , such as FIPS, Common Criteria, GDPR, HIPAA, and PCI-DSS • Apply policies - Role-based access control features allow you to apply policies for individual key containers, such as requiring a quorum of administrators to provide a smart card and PIN to unlock the key stored in the HSM • Gain greater control - Use your own nShield HSMs in your own environment to create and securely export your keys to the cloud • Achieve stronger security - Stronger key generation using nShield’s high-entropy random number generator protected by FIPS-certified hardware
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (430)
Subscribers (38898)
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.