PRODUCTS

A hardware security module, or HSM, is a dedicated, standards-compliant cryptographic appliance designed to protect sensitive data in transit, in use, and at rest through the use of physical security measures, logical security controls, and strong encryption.



What HSMs Do 

An HSM’s core functionality is centered around encryption: the process by which sensitive data is rendered indecipherable to all except authorized recipients. HSMs also offer a secure way to decrypt data to ensure message confidentiality and authenticity. 


Encryption is made possible through the use of encryption keys—randomly generated values that must be kept secret in order to protect the encrypted data. Because knowledge of the encryption key aids in decrypting information, it is vital that these keys are secured in a private environment.  


Hardware security modules generate and store the keys used for encrypted communication among devices within a Secure Cryptographic Device (SCD), which is a far more secure method than solely using software. When information is sent to the HSM via a trusted connection, the HSM allows for the quick and safe encryption or decryption of that information using the appropriate key.

Excrypt SSP9000

Excrypt SSP9000

Industry-leading technology for financial and general-purpose transaction processing and data security

  • FIPS 140-2 Level 3 and PCI HSM-validated
  • Standardize HSM infrastructure onto a single platform
  • Scalable up to 2,250 transactions per second
  • Process EMV, RSA, P2PE, tokenization, and mobile transactions
Excrypt SSP9000 Enterprise

Excrypt SSP9000 Enterprise

Protect your sensitive data and transactions with industry-leading security in the fastest payment HSM in the world

  • Up to 8,000 transactions per second (TPS)
  • Meets or exceeds industry compliance standards
  • Allows for up to four separate data processing environments within a single physical platform
  • Increases the overall speed and functionality of your HSM network
ESM1000

ESM1000

Integrate small form-factor encryption devices directly into a variety of environments for on-site data security

  • Supports all common key types and protocols
  • Optional external self-contained enclosure
  • Optimized size, weight, power, and cooling characteristics
  • Supports mutual authentication under a trusted root certificate
REM1000

REM1000

Secure retail data at the source with embeddable, small form-factor encryption devices

  • Supports mutual authentication to establish a trusted public key infrastructure
  • Tamper evident and resistant design
  • Automatic adjustment to power inputs
  • Simple installation and management procedures
Vectera Series

Vectera Series

Protect your sensitive data and transactions with industry-leading security in the Vectera Series general-purpose HSMs

  • Meets or exceeds industry compliance standards
  • Increases the overall speed and functionality of your HSM network
  • Supports a variety of cryptographic functionality