Search Resources

Refine Search


Resource Library

Results for Data Protection


Most Recent Alphabetical

Authenticated Network Access - F5 BIG-IP APM - Solution Brief

Today, employees, partners, and customers need to access corporate applications and data at all times and from any location, whether they are inside or outside the traditional security perimeter.

Arab Bank - eToken NG-OTP - Case Study

To ensure absolute security of customer data and fi nancial accounts, Arab Bank (Switzerland) Ltd. relies on SafeNet eToken certifi cate-based twofactor authentication for digital and physical access.

Securing XIV Storage - KeySecure - Solution Brief

In the era of Big Data, organizations collect more data points than ever before. Often, organizations will store these data points because of regulatory concerns or because they hope to mine them in a way that is useful to business operations.

Protecting Microsoft 365 with SafeNet Authentication Service

This guide describes the process for enabling SAS strong authentication with Microsoft Office 365. This document assumes that the Microsoft Office 365 and ADFS environment is already configured and working with ‘static’ passwords prior to implementing SAS strong authentication. In this document Microsoft Office 365 is configured for Single Sign On (SSO) against an on-premise ADFS 2.0 service with reliance on SafeNet Authentication Service for strong authentication.

Payfair - Luna EFT - Case Study

PayFair manages transactions for millions of credit cards across Europe, and relies on SafeNet’s Luna EFT Hardware Security Modules to ensure compliance, provide identity assurance, and ensure data integrity - while easily managing and auditing operations, users, and roles.

Tutuka - Luna EFT, KeySecure - Case Study

With SafeNet Luna EFT Hardware Security modules and KeySecure, Tutuka is able to encrypt credit card data in Microsoft SQL database and implement a secure PIN generation and validation solution, as well as achieve PCI DSS and EMV compliance and lower their total cost of ownership (TCO).

Six ways to enhance security in AWS - ebook

Cloud computing is fundamentally transforming the way enterprises, government agencies, and small businesses are managing their data.

(509 resources found) Page:   1 2 3 4 5 6 7 8 9 10