Learn how to build applications for nShield HSMs
Designed for architects and developers who will be integrating nShield HSMs with their applications, this two-day class provides the skills needed to design, build, test, deploy, and maintain HSM applications.
The class exposes developers to the broad capabilities of nShield HSMs, providing training in the full range of available application programming interfaces (APIs). Guided by experienced Thales ASG consultants who use these APIs in their client work, you will develop the ability to choose the best interface for a given project and gain practical experience writing and running code.
In addition to core APIs, the course covers use of the CodeSafe and CodeSafe SSL capabilities as well as the payShield Cardholder Authentication for nShield option. Other topics include load balancing, failover, the Security World key management architecture, and compliance considerations. With the wealth of practical knowledge gained in this class, your development team will be able to avoid common pitfalls, maximize security and application performance, plan and execute faster, more efficient deployments, and reduce overall costs.
Recommended for: Administrators/developers who will be working with nShield HSMs
Time commitment: Two-day class
Certification: Certificate of attendance
Prerequisites: Java or C programming experience
Class schedule: Contact us to request a schedule.
Data Sheet : Thales Certified Solution Developer (nCSD) Training
Thales Certified Solution Developer Training enables your team to quickly learn the skills needed to build, test, and deploy HSM applications using Thales HSMs from the nCipher product line.Thales training exposes developers to the broad capabilities of Thales HSMs and their available integration interfaces. In two days of training, developers learn the full range of application programming interfaces (APIs) available.Download
Data Sheet : Thales nShield Certified Systems Engineer Training
The nCSE provides the training to give your people the knowledge to get the most from your investment. Getting the best from your technology requires a technology, getting the best use from it depends on how much you invest in it. Thales has an enviable reputation in the field of data protection, with over 40 year’s experience. ASG are the professional services department within Thales eSecurity division. With a dedicated team of 14 consultants ASG are well placed to offer expert advice and training on all Thales hardware security devices, giving you the confidence to deploy efficiently and effectivelyDownload
Datenblatt: nShield Connect HSM
nShield Connect HSM sind zertifizierte, vernetzte Anwendungen, die kryptographische Schlüsseldienste für über Server und virtuelle Maschinen verteilte Anwendungen bereitstellen.
Data Sheet : nShield Edge
The nShield Edge is the universal serial bus (USB)-attached hardware security module (HSM) in the Thales family of high security data protection solutions. The nShield Edge combines a full-featured HSM with a smart card reader in one portable device, offering secure backup and dual control access to an organization’s high-value keys for low transaction volume environments. The independently certified platform performs key management and cryptographic operations such as encryption and digital signing on behalf of a wide range of commercial and custom-built business applications and critical security systems including offline certificate authorities (CAs) for public key infrastructures (PKIs), code signing and remote HSM management.Download
Data Sheet : nShield Solo
The nShield Solo is the server-embedded hardware security module (HSM) in the Thales family of high security data protection solutions.Download
Data Sheet : CodeSafe
The Thales CodeSafe developer toolkit provides the unique capability to move sensitive applications within the protected perimeter of a FIPS 140-2 Level 3 certified nShield hardware security module (HSM). Business applications running on host servers are increasingly vulnerable to a variety of attacks and advanced persistent threats(APTs) that can compromise critical operations and lead to massive costs and disruption of services. While sensitive applications often employ cryptographic mechanisms to protect sensitive data, these applications can still be the target of attack by APTs and vulnerable to manipulation unless protected within a hardened environment.Download