A hardware security module, or HSM, is a dedicated, standards-compliant cryptographic appliance designed to protect sensitive data in transit, in use, and at rest through the use of physical security measures, logical security controls, and strong encryption.

What HSMs Do 

An HSM’s core functionality is centered around encryption: the process by which sensitive data is rendered indecipherable to all except authorized recipients. HSMs also offer a secure way to decrypt data to ensure message confidentiality and authenticity. 

Encryption is made possible through the use of encryption keys—randomly generated values that must be kept secret in order to protect the encrypted data. Because knowledge of the encryption key aids in decrypting information, it is vital that these keys are secured in a private environment.  

Hardware security modules generate and store the keys used for encrypted communication among devices within a Secure Cryptographic Device (SCD), which is a far more secure method than solely using software. When information is sent to the HSM via a trusted connection, the HSM allows for the quick and safe encryption or decryption of that information using the appropriate key.

Vectera Series

Protect your sensitive data and transactions with industry-leading security in the Vectera Series general-purpose HSMs

  • Meets or exceeds industry compliance standards
  • Increases the overall speed and functionality of your HSM network
  • Supports a variety of cryptographic functionality

Excrypt Series

Industry-leading technology for financial and general-purpose transaction processing and data security

  • FIPS 140-2 Level 3 and PCI HSM-validated
  • Standardize HSM infrastructure onto a single platform
  • Scalable up to 20,000 transactions per second
  • Process EMV, RSA, P2PE, tokenization, and mobile transactions

Excrypt SSP Enterprise v.2

Protect your sensitive data and transactions with industry-leading security and speed:

  • Meets or exceeds industry compliance standards
  • Virtual HSMs allow for multiple independent data processing environments within a single physical platform
  • Increases the overall speed and functionality of your HSM network


Integrate small form-factor encryption devices directly into a variety of environments for on-site data security

  • Supports all common key types and protocols
  • Optional external self-contained enclosure
  • Optimized size, weight, power, and cooling characteristics
  • Supports mutual authentication under a trusted root certificate


Secure retail data at the source with embeddable, small form-factor encryption devices

  • Supports mutual authentication to establish a trusted public key infrastructure
  • Tamper evident and resistant design
  • Automatic adjustment to power inputs
  • Simple installation and management procedures