Gemalto
Get SafeNet News

Search Resources

Refine Search

Product

Resource Library

Results for Data Protection

SORT BY:

Most Recent Alphabetical

SafeNet security enhancements for IBM solutions - eBook

Own and Manage Your Own Encryption Keys White Paper

How to Become EPCS Compliant with SafeNet Authentication - White Paper

Business End of DP-Securing Data on Move - White Paper

A business guide to the protection of data in motion through encryption—this paper has been created for business managers, to explain how data is vulnerable as it moves across data networks and why sensitive data should be encrypted. It can be used to understand the security issues and risks to data while it moves through computer networks. It will help you to navigate your way through what can otherwise be confusing technical information.

Encryption as a Shared Service - White Paper

Move past silo-constrained encryption and begin to deploy encryption as a shared service centrally, uniformly, and at scale across the enterprise. To counter the encryption challenges faced by organizations today, enable your IT teams to offer enterprise-wide centralized key management, encryption, and tokenization, including auditing and compliance capabilities, as a shared service. Provide your organization unmatched coverage—securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments; and the critical key management needed to effectively and efficiently enable protection across the enterprise. With SafeNet, organizations can apply data protection where they need it, when they need it, and how they need it—according to the unique needs of their business.

Securing File Data Storage - White Paper

For security teams looking to secure file data in storage, there are a plethora of choices available, and each has its specific set of strengths and limitations. This paper offers a comprehensive look at the choices available, outlines the key criteria to consider in evaluating these options, and delivers some best practices that security teams can apply to help ensure their specific encryption deployments meet primary objectives.

Maximizing Security of Web Applications - White Paper

Today, Java applications are at the center of many of our online interactions—and they are also the focus of a significant amount of cyber-attacks. This paper examines the security gaps in Java applications that are leaving many organizations vulnerable, and it details how SafeNet Luna SP can help organizations address these gaps.

(118 resources found) Page:   1 2 3 4 5 6 7 8 9 10