Get SafeNet News

Search Resources

Refine Search


Resource Library

Results for Data Protection


Most Recent Alphabetical

SafeNet Authentication Service: Deployment Guide for MobilePASS BlackBerry

This document describes how to deploy MobilePASS for BlackBerry.

MobilePASS for BlackBerry allows users to automatically activate and enroll their software tokens over Wi-Fi and wireless networks using the MobilePASS application. MobilePASS for BlackBerry can be downloaded and installed directly to devices running BlackBerry OS version 5.0 and higher. MobilePASS for BlackBerry software tokens can be deployed as follows:


  • As an application on the Blackberry Enterprise Server (BES)
  • Over the Air (OTA) via the SafeNet-hosted server
  • OTA via your own internally-hosted server


Everything You Need to Know About Crypto Management Guide Book

SafeNet Authentication Service: Agent for Microsoft SharePoint on IIS 7&8 Configuration Guide

VPN - When Virtual Security is Not Enough - Technical White Paper

Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure.

The Threat to your Manufacturing Ecosystem - White Paper

To get their products to market, today’s manufacturers leverage an increasingly distributed mix of third-party vendors and partners. While these distributed ecosystems have yielded improved agility, innovation, and profits, they’ve also introduced significant risks to the security of sensitive information

The Current State of Encryption and Key Management - White Paper

While encryption has been employed for decades, much has changed recently, and more change is sure to come. In recent years, the use of encryption has continued to increase, but so too have the number and scope of threats.

Software based Encryption vs Hardware based Encryption - White Paper

Software-based encryption solutions use a distributed key storage mechanism: keys are stored on the application and database servers on which the data to be encrypted resides. In the simplest case, where only one database server exists, key management is modestly simple.

(676 resources found) Page:   1 2 3 4 5 6 7 8 9 10