sb-eu logo
Story image

nCipher launches HSM-as-a-Service for organisations adopting cloud-first strategies

19 Sep 2019

Entrust Datacard company nCipher Security has announced nShield as a Service, a cloud-based hardware security module (HSM) service that allows organisations to protect sensitive data and applications and helps meet compliance mandates using on-demand cryptography.

“Organisations embracing cloud-first strategies require cloud-first encryption,” says nCipher Security strategy vice president Peter Galvin.

“This means remote, automated management at scale, and flexible access control both in the cloud and onsite. nShield-as-a-Service makes it easy to adopt a secure, multi-cloud encryption strategy using the same nShield HSMs organisations deploy onsite today.”

nShield-as-a-Service is ideal for cloud-first strategies, selective cloud migration, or adding HSM capacity to handle workload spikes.

The customer experience is consistent and familiar – users interact with the cloud-based nShield HSMs in the same way as with nShield appliances in their own data centres.

Customers utilising nCipher’s secure execution environment to run sensitive application code within a secure FIPS-validated boundary now have that same opportunity using cloud-based as well as on-premises HSMs.

Using nShield as a Service, customers can:

  • implement Bring Your Own Key and Host Your Own Key solutions with a trusted third-party service
  • maintain full control over key material and maintain separation of data from the encryption keys
  • extend cloud-based cryptography and key management across multiple clouds
  • implement secure code execution for cloud-based workloads
  • integrate with third-party applications in the cloud

“The nShield as a Service launch highlights the synergies we’ve gained since becoming an Entrust Datacard company in June,” Galvin says.

“We were able to accelerate and enhance nShield as a Service by combining our HSM and cryptography expertise with Entrust Datacard’s experience in data centres, cloud services and HSM operations.”

IDC security products research director Robert Westervelt says, “Encryption is a powerful tool.”

“Delivering it easily across distributed infrastructure can be very effective in protecting data and applications against cyberattacks.”

How nShield-as-a-Service works

nShield-as-a-Service uses nShield HSMs to generate, access and protect cryptographic key material separately from sensitive data.

All nShield HSMs are managed through nCipher’s unique Security World key management architecture that spans cloud-based and on-premises HSMs.

This lets customers efficiently scale HSM operations while retaining control of their key material, even if they change their cloud service provider.

Organisations can utilise nShield as a Service to supplement or replace on-premises HSMs, while keeping the benefits of HSM ownership.

The subscription model lets enterprises budget predictably, manage capacity, reduce data centre footprint and decrease time spent on routine maintenance and monitoring.

Customers seeking cloud-first solutions can work with cybersecurity and infrastructure vendors in nCipher’s nFinity Strategic Technology Partner program, including F5, IBM, Micro Focus Voltage, Red Hat and Venafi.

Applications include SSL/TLS, code signing, data and database encryption and more.

Story image
Organisations take cloud-first approach to security, though concerns remain
"While the results of this survey show that some security professionals still have concerns, having visibility into cloud services is vital and many organisations are now taking a cloud-first approach to security.”More
Story image
Opportunity knocks for robotics in world of COVID-19
ABI Research highlights that while manufacturing opportunities are down, the worlds of disinfecting, surveillance and delivery are opening.More
Story image
Mentorship key to bringing women into cybersecurity - Microsoft
“Diverse teams make better and faster decisions 87% of the time compared with all male teams, yet the actual number of women in our field fluctuates between 10 and 20%. What ideas have we missed by not including more women?”More
Story image
Google Chrome postpones changing cookie policy in wake of COVID-19
Google Chrome says it began enforcing secure-by-default handling of third-party cookies with its release of the Chrome 80 update in February. But now the work has been postponed due COVID-19.More
Story image
HP announces three new security solutions for remote workers
HP says over 80% of home office routers have been found to be vulnerable to potential cyberattacks, and 90% of PC infections originate from email attachments.More
Story image
Online retailers lose millions as 1/3 of customers forget password at checkout
Recently released research has found about one in three of online purchases are abandoned at checkout because people cannot remember their password to access their account and confirm their purchase.More