Entrust Data security and encryption

Common encryption platform for the widest range of database environments

Reduce the risk of a breach with Entrust database encryption and key management solutions.

Entrust nShield™ HSMs enable enterprises to protect their most sensitive keys from both internal and external threats, and comply with data protection mandates. With Entrust nShield HSMs, you can take full advantage of native database encryption capabilities and still add higher levels of assurance to key management activities, ensuring optimal security, efficiency, and guaranteed accessibility to encrypted data.


Central Point of Failure

Databases represent a central aggregation point—and a focal point for thieves. Your databases, whether on-premises or in the cloud, hold the data that matters to your business and that is prized by would-be attackers.

Insufficient Security Controls

Insufficient security controls expose your organization to fraud and data breaches. For example, when key management is handled within the database, the DBA has control of both the data and key. Database encryption solutions often disregard the potential for insider abuse, as well as advanced persistent threats, where an attacker imitates a privileged user.

Lost Keys

Key loss can render data unavailable, since decryption would be impossible—disrupting business operations.


Entrust nShield HSMs Key Protection

For environments that require higher levels of security, Entrust nShield HSMs deliver FIPS-certified protection for your database keys. Available in multiple form factors, Entrust nShield HSMs help you meet your needs for high assurance security and compliance, and serve environments ranging from desktop databases to single-server databases to database applications distributed across a network—all while safeguarding keys in a hardened solution.


Simplified Compliance

Simplify data privacy compliance obligations and reporting activities through the use of a security-certified encryption and key management to enforce critical best practices and other standards of due care.

Separation of Duties

Enforce separation of duties by isolating master keys from encrypted data, reducing the threat of an insider attack.

Reduced Costs

Maximize efficiency by reducing administration costs associated with managing keys in large-scale database environments with Entrust’s industry-leading Security World key management architecture.