Hardware security modules (HSMs) are a key foundational security component of public key infrastructure. HSMs hold the crown-jewel keys for encryption and digital signatures and perform encryption and decryption operations on protected data and payment information. While HSMs have been in use for decades, they now play an oversized role in migrating to post-quantum security and encryption.
Our latest report, Hardware Security Module Requirements For The Post-Quantum Era, is now live. In this report, we highlight:
Enterprise drivers to procure HSMs.
Key use cases and architecture of HSMs.
Pros and cons of HSM hosting models.
Established requirements for HSMs.
Emerging and post-quantum cryptography requirements.
Best practices for deploying and integrating HSMs.
Forrester clients who want to dive deeper into this topic and discuss the role that HSMs should play in their post-quantum migration should schedule an inquiry or guidance session with either of us.



















