HSMs for eInvoicing - Solution Brief
Trust is a critical requirement for the feasibility of eDocuments. Digital signatures, powered by encryption and public key infrastructure (PKI), represent the means for establishing trust in eDocuments. Digital signatures give all parties the confi dence required to trust that documents come from known entities, and that they have not been altered in transit. In turn, these digital signatures need to have foolproof, comprehensive security mechanisms to protect them: If digital signatures are in any way compromised, the entire eDocument infrastructure will be compromised. This is where hardware security modules (HSMs) come into play.
Security Solutions for Microsoft Applications - eBook
Since the modern era of computing, Microsoft Corporation has been a foundational provider of software applications organizations have relied on heavily to conduct all aspects of their businesses.
Mainframe Encryption and Key Management with PKWARE and Gemalto
PKWARE mainframe encryption couples with Gemalto’s SafeNet KeySecure key management appliance to offer an enterprise class security solution for IBM Mainframe z/OS operating environments.
A Comprehensive Guide to Securing Data with Database Encryption
Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. This paper offers a detailed look at why the demand for database encryption is growing more critical and more challenging to contend with. The paper offers an overview of the key approaches required to address this increased demand, and it outlines the different types of encryption approaches—helping managers ensure they’re using the right tools for the right purposes. Finally, this paper offers a look at Gemalto’s portfolio of SafeNet Data Protection solutions, and reveals how these solutions enable security teams to address their database security objectives in an efficient, holistic manner.
Why the Demand for Database Encryption is Growing, and Growing More Difficult
Determining How to Encrypt Database Data
Solutions for Protecting Select Columns in Databases
Solutions for Protecting the Entire Database File
Robust, Centralized Enterprise Key Management
eToken 5100 - Product Brief
Petroleum Development Oman - Gemalto SafeNet Authentication Service - Case Study
Petroleum Development Oman requires off-site employees to use two-factor authentication to access sensitive corporate resources. The oil and gas company first deployed SafeWord tokens, and recently upgraded 3500 users to Gemalto SafeNet Authentication Service – a user-friendly solution with enhanced reporting and management.
SAS Using LDAP and RADIUS Protocol for Cisco ASA
This document describes how to configure Cisco ASA to work with SafeNet Authentication Service in RADIUS mode.