Hardware Security Modules are a key foundational security component of public key infrastructure (PKI). HSMs hold the crown jewel keys for encryption and digital signatures, and perform encryption and decryption operations on protected data and payment information. While HSMs have been in use for decades, they now play an oversized role in migrating to post quantum security and encryption.

Our latest report, Hardware Security Modules for the Post-Quantum Era is now live. In this report, we highlight

  • Enterprises’ drivers to procure HSMs
  • Key use cases and architecture of HSMs
  • HSM hosting model pros and cons
  • Established requirements for HSMs
  • Emerging and post quantum cryptography (PQC) requirements
  • Best practices for deploying and integrating HSMs

Forrester clients who want to dive deeper into this topic and discuss the role HSMs should play in your post quantum migration, should schedule an inquiry or guidance session with either of us.