Authenticated Network Access - F5 BIG-IP APM - Solution Brief
Today, employees, partners, and customers need to access corporate applications and data at all times and from any location, whether they are inside or outside the traditional security perimeter.
Arab Bank - eToken NG-OTP - Case Study
To ensure absolute security of customer data and fi nancial accounts, Arab Bank (Switzerland) Ltd. relies on SafeNet eToken certifi cate-based twofactor authentication for digital and physical access.
Securing XIV Storage - KeySecure - Solution Brief
In the era of Big Data, organizations collect more data points than ever before. Often, organizations will store these data points because of regulatory concerns or because they hope to mine them in a way that is useful to business operations.
Protecting Microsoft 365 with SafeNet Authentication Service
This guide describes the process for enabling SAS strong authentication with Microsoft Office 365. This document assumes that the Microsoft Office 365 and ADFS environment is already configured and working with ‘static’ passwords prior to implementing SAS strong authentication. In this document Microsoft Office 365 is configured for Single Sign On (SSO) against an on-premise ADFS 2.0 service with reliance on SafeNet Authentication Service for strong authentication.
Payfair - Luna EFT - Case Study
PayFair manages transactions for millions of credit cards across Europe, and relies on SafeNet’s Luna EFT Hardware Security Modules to ensure compliance, provide identity assurance, and ensure data integrity - while easily managing and auditing operations, users, and roles.
Tutuka - Luna EFT, KeySecure - Case Study
With SafeNet Luna EFT Hardware Security modules and KeySecure, Tutuka is able to encrypt credit card data in Microsoft SQL database and implement a secure PIN generation and validation solution, as well as achieve PCI DSS and EMV compliance and lower their total cost of ownership (TCO).
Six ways to enhance security in AWS - ebook
Cloud computing is fundamentally transforming the way enterprises, government agencies, and small businesses are managing their data.