Contact Us

Search Resources

Refine Search


Resource Library

Results for Data Protection

  • Featured

    Data Breaches in H1 2015 Infographic

    As documented in the Breach Level Index, the first six months of 2015 demonstrated that hackers continue to get past conventional perimeter security with relative ease, targeting nearly every industry and executing several high profile data breaches that scored tens of millions of data records each. 


Most Recent Alphabetical

HSMs for eInvoicing - Solution Brief

Trust is a critical requirement for the feasibility of eDocuments. Digital signatures, powered by encryption and public key infrastructure (PKI), represent the means for establishing trust in eDocuments. Digital signatures give all parties the confi dence required to trust that documents come from known entities, and that they have not been altered in transit. In turn, these digital signatures need to have foolproof, comprehensive security mechanisms to protect them: If digital signatures are in any way compromised, the entire eDocument infrastructure will be compromised. This is where hardware security modules (HSMs) come into play.

Security Solutions for Microsoft Applications - eBook

Since the modern era of computing, Microsoft Corporation has been a foundational provider of software applications organizations have relied on heavily to conduct all aspects of their businesses.

Mainframe Encryption and Key Management with PKWARE and Gemalto

PKWARE mainframe encryption couples with Gemalto’s SafeNet KeySecure key management appliance to offer an enterprise class security solution for IBM Mainframe z/OS operating environments.

A Comprehensive Guide to Securing Data with Database Encryption

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. This paper offers a detailed look at why the demand for database encryption is growing more critical and more challenging to contend with. The paper offers an overview of the key approaches required to address this increased demand, and it outlines the different types of encryption approaches—helping managers ensure they’re using the right tools for the right purposes. Finally, this paper offers a look at Gemalto’s portfolio of SafeNet Data Protection solutions, and reveals how these solutions enable security teams to address their database security objectives in an efficient, holistic manner.

Topics covered:

  • Why the Demand for Database Encryption is Growing, and Growing More Difficult

  • Determining How to Encrypt Database Data

  • Solutions for Protecting Select Columns in Databases

  • Solutions for Protecting the Entire Database File

  • Robust, Centralized Enterprise Key Management

eToken 5100 - Product Brief

Petroleum Development Oman - Gemalto SafeNet Authentication Service - Case Study

Petroleum Development Oman requires off-site employees to use two-factor authentication to access sensitive corporate resources. The oil and gas company first deployed SafeWord tokens, and recently upgraded 3500 users to Gemalto SafeNet Authentication Service – a user-friendly solution with enhanced reporting and management.

SAS Using LDAP and RADIUS Protocol for Cisco ASA

This document describes how to configure Cisco ASA to work with SafeNet Authentication Service in RADIUS mode.

(759 resources found) Page:   1 2 3 4 5 6 7 8 9 10