HSM Banner

Hardware Security Modules (HSMs)

The Highest Performing, Most Secure Application and Transaction Security Solution for Enterprise & Government Organizations.

What is a Hardware Security Module?

Hardware Security Module Icon

A hardware security module (HSM) is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle. Hardware security modules act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys inside a hardened, tamper-resistant device.

What Do Hardware Security Modules Do?

HSMs provide protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services for a wide range of applications.



What Makes SafeNet HSMs Unique?

SafeNet HSMs incorporate features developed through extensive operational experience, implementing best practices in hardware, software, and operations that make the deployment of secure HSMs as easy as possible.

SafeNet HSMs adhere to rigorous design requirements and must pass through stringent product verification testing, followed by real-world application testing to verify the security and integrity of every device.

With SafeNet Hardware Security Modules, You Can:

  • Offload and accelerate cryptographic operations to a dedicated cryptographic processor that eliminates bottlenecks and maximizes application performance

  • Centralize lifecycle management of cryptographic keys—from generation, distribution, rotation, storage, termination, and archival— in a purpose-built, highly secure appliance

  • Improve profitability and achieve compliance with solutions for paper-to-digital initiatives, PCI DSS, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.


Select Your Hardware Security Module:

General Purpose HSMs

Cryptographic Key Icon

Available in a wide range of form factors and performance options, SafeNet's Luna General Purpose HSMs safeguard the cryptographic keys used to secure transactions, applications, and sensitive data.

SafeNet's General Purpose HSMs:

  • Luna SA: A network-attached HSM protecting encryption keys used by applications in on-premise, virtual, and cloud environments.


    Learn More


  • Luna PCI-E: An embedded HSM that protects cryptographic keys and accelerates sensitive cryptographic operations.


    Learn More


  • Luna G5: An USB-attached HSM that is ideal for storing root cryptographic keys in an offline key storage device.


    Learn More

Customizeable HSMs

Orange HSM Icon

The ProtectServer Hardware Security Module Product Family

  • ProtectServer HSMs offer a unique level of flexibility for application developers to create their own firmware and execute it within the secure confines of the HSM. Known as functionality modules, the toolkits provide a comprehensive facility to develop and deploy custom firmware.


  • Luna SP allows developers to securely deploy Web applications, Web services and other Java applications in a protected hardened security appliance.


Learn About ProtectServerLearn About Luna SP

Financial & Payment HSMs

Credit Card Icon

The Luna EFT & ViewPIN+ Hardware Security Modules

  • Luna EFT is a network-attached Hardware Security Module (HSM) designed for retail payment system processing environments for credit, debit, e-purse and chip cards, as well as internet payment applications.


  • ViewPIN+ is a secure Web-based PIN issuance and management solution that eliminates the need for expensive, insecure, and time-consuming paper-based PIN delivery to customers.


Learn About Luna EFTLearn About ViewPIN+

Cloud HSMs

Cloud Data Protection Icon
  • With Crypto Command Center, organizations can establish centralized, HSM-as-a-Service deployments that leverage SafeNet’s market leading hardware security modules.


  • Managed by the Crypto Command Center, our Crypto Hypervisor enables IT departments to deliver on-demand, elastic cryptographic services for data protection via cloud environments.


Learn About Crypto Command CenterLearn About Crypto Hypervisor
view HSM Resources

HSM Resources

As a pioneering developer of HSMs, SafeNet has been bringing secure HSMs to market since 1994. SafeNet Luna products incorporate features developed through extensive operational experience. To learn more, please refer to our resources below.

What is an HSM?

 

Intro to the Crypto Command Center - Encryption Key Icon

White Paper - Intro Crypto Command Center HSM Provisioning Cloud

Crypto Command Center represents a revolution in provisioning cryptographic resources, and firmly plants the HSM and its associated key management and cryptographic functions in the evolving cloud and virtual world.

HSM Family Brochure - Encryption Key Icon

Family Brochure - SafeNet HSMs: True Hardware-Based Key Management

Ranked #1 in the market worldwide, SafeNet Hardware Security Modules (HSMs) provide reliable protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services. Robust FIPS and Common Criteria validation makes SafeNet HSMs tamper-resistant.

Luna SA HSM Product Brief - Encryption Key Icon

Product Brief - Luna SA

Luna SA is the choice for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.

Secure Luna HSM Connections in Virtual Environments - Cryptographic Key Icon

White Paper - Securing Luna HSM Connections in Virtual Environments

The threat of a stolen computer has always been a security concern for Enterprises. In most IT environments today that could apply to everything from personal smartphones/PDAs, laptops, and personal computers up to large server platforms. This form of attack has, until recently, necessitated the physical theft of the computer.

HSMs: Critical to Information Risk Management - Encryption Key Icon

White Paper - HSM: Critical to Information Risk Management

The volume of information is mushrooming and being transformed from paper to digital form at an alarming rate with no end in sight. Properly addressing security threats to all of this data requires proper cryptographic key storage and management.


On-Demand Webinar:

[ektdesignns_placeholder_ID0E6VAE]
view HSM Overview
CTA HSM Critical Risk Mgmt WP
CTA - 451 Research Report - AWS SKMS
CTA - An Enterprise Guide to Key Management