Get SafeNet News

Search Resources

Refine Search


Resource Library

Results for Data Protection


Most Recent Alphabetical

Gemalto SafeNet ProtectFile for Dell Storage SC Series Solution Brief

Dell Storage’s highperformance, scalable platform integrates with Gemalto’s SafeNet ProtectFile encryption to provide the data-centric security needed to render sensitive data useless in the event of a breach, misuse or hijacking of privileged accounts, physical theft of servers, and other potential threats.

Gemalto SafeNet HSM and F5 BIG-IP Local Traffic Manager Performance Testing Overview

This paper presents findings from testing of up to 10 Gemalto SafeNet HSMs with an F5 BIG-IP 7200 appliance running TMOS version 11.6, and recommendations based on the results.

Authentication Services - Brochure

SafeNet Authentication Service provides a cloud-based authentication solution that are easier to use and less expensive than traditional hardware token and manually-provisioned systems.

University of Texas at Austin - Luna SP - Case Study

The Information Security Office at the University of Texas at Austin needed a robust hardware security module (HSM) that met stringent security demands and application requirements—and Gemalto SafeNet Luna SP platforms were up to the task.

Swedish National Board of Healthcare - Luna SA HSM - Case Study

The Swedish National Board of Health and Welfare selected Gemalto when it wanted to take a proactive approach to implementing a secure and unified identity and access management solution that would also provide increased security for sensitive medical professional and patient information.

Unshare and Secure Sensitive Data - Encrypt Everything eBook

We live in a world of sharing, and sometimes we share a little more than we should. Of course, we’re not only referring to social media posts here; this also includes what is happening with your corporate data assets too.

With your organization’s sensitive data being stored, sliced and diced, and shared more than ever before, you must have a way to keep it safe, especially in cloud and multi-tenant environments. Approved users and processes need to be able to leverage the data that’s available, while you ensure any high-value, sensitive information, such as intellectual property, personally identifiable information, and company financials, remains on lock down wherever it resides. 

We call this unsharing your data, and in our free ebook, we outline the steps enterprises need to follow to unshare and protect your sensitive data. Read it today to learn the must-follow enterprise encryption best practices!

NASDAQ OMX - HSM - Case Study

To deliver a cloud solution that is viable for the financial services market, NASDAQ OMX needed to ensure a host of stringent security policies and compliance mandates would be addressed.

By leveraging Gemalto HSMs, NASDAQ OMX has been able to provide maximum security of the cryptographic keys used to encrypt customer data.

(726 resources found) Page:   1 2 3 4 5 6 7 8 9 10