CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

黃金級

nCipher Security

Today's fast-moving digital environment enables enterprises to operate more efficiently, gain competitive advantage and serve customers better than ever before. It also multiplies the security risks. 
nCipher Security’s cryptographic solutions secure emerging technologies – cloud, IoT, blockchain, digital payments – and help meet new compliance mandates. Using the same proven technology that our customers depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business critical information and applications, ensuring the integrity of your data and putting you in complete control – today, tomorrow, and at all times.

CryptographyIoT SecurityPKI

nShield HSM

The nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more.

  • To suit your specific environment, the nShield family of general purpose HSMs are available in three FIPS 140-2 certified form factors:

        nShield Connect-Network-attached appliances
        nShield Solo-PCIe cards for embedding in appliances or servers
        nShield Edge-Portable USB-based modules

  • nShield HSMs support for wide variety of uses and deployment scenarios, including PKI, SSL/TLS encryption key protection, code signing, digital certificates/ signing and blockchain, as well as industry’s most widely used operating systems and APIs.
  • Cloud-friendly web service interfaces.
  • Stronger key management for your cloud data with nShield BYOK.
  • Certification to industry standard, such as FIPS 140-2, Common criteria and eidas compliance.
     
  • General purpose HSMs
  • Credentialing and PKI security
  • Database, code signing security
  • BYOK (Bring Your Own Key) 
     
  • nShield HSMs

    nCipher Security’s nShield Hardware Security Modules (HSMs) are hardened, tamper-resistant devices that protect your company’s most sensitive data. These FIPS 140-2 certified modules perform cryptographic functions such as generating, managing and storing encryption and signing keys, as well as executing sensitive functions within their protected boundaries. A powerful addition to your security stack, nShield HSMs help you to: achieve higher levels of data security and trust, meet and exceed important regulatory standards, maintain high service levels and business agility.

  • IoT/Device Credentialing

    The Internet of Things requires security and trust in order to reach its full potential. The explosion of the IoT introduces significant opportunities – as well as potential threats. nCipher’s nShield HSMs, combined with supporting security applications from nCipher Technology partners, enable manufacturers to provide each device a unique ID using the strongest cryptographic processing, key protection, and key management available. The solution include device authentication, code signing and manufacturing security.

  • nShield Bring Your Own Key (BYOK)

    With nShield Bring Your Own Key (BYOK), you bring your own keys to your cloud applications, whether you’re using AWS, Google Cloud Platform (GCP) or Microsoft Azure. nShield high-assurance HSMs let you continue to benefit from the flexibility and economy of cloud services while you strengthen the security of your key management practices and gain greater control over your keys.

How to secure your sensitive data in the cloud

Want to take advantage of the flexibility, convenience and savings of cloud-based technology while maintaining exclusive control over your sensitive data? You can! Thales e-Security and Microsoft innovative “Bring Your Own Key” (BYOK) solution puts you in control to secure your data in the cloud.


Why PKI is critically important for the secure deployment of IoT technologies

As connected devices continue to expand into the mainstream, the digital transformation is all around us. A PKI with a HSM root of trust enables you to issue device credentials so you can validate the identity of your connected devices and the integrity of the data they collect. 


Product Type

CryptographyIoT SecurityPKI