Contact Us

Search Resources

Refine Search

Product

Resource Library

Results for Data Protection

SORT BY:

Most Recent Alphabetical

High Speed Encryption Across MPLS Networks - Technical White Paper

SafeNet High Speed Encryptors (HSEs) from Gemalto are certified layer 2 encryption devices that provide confidentiality and optional authentication of information that is transmitted across communication networks.

SafeNet Security Enhancements for IBM Solutions - eBook

Secure Code Signing: Leveraging HSMs to Protect Your Business - White Paper

This paper looks at the critical nature of code signing and how hardware security modules (HSMs) can be used to protect the keys that underpin the code signing environment.

Network Metadata: Why Your Organization is Exposed and What to Do About It - White Paper

Unshare and Secure Sensitive Data: Encrypt Everything - eBook

We live in a world of sharing, and sometimes we share a little more than we should. Of course, we’re not only referring to social media posts here; this also includes what is happening with your corporate data assets too.

With your organization’s sensitive data being stored, sliced and diced, and shared more than ever before, you must have a way to keep it safe, especially in cloud and multi-tenant environments. Approved users and processes need to be able to leverage the data that’s available, while you ensure any high-value, sensitive information, such as intellectual property, personally identifiable information, and company financials, remains on lock down wherever it resides. 

We call this unsharing your data, and in our free ebook, we outline the steps enterprises need to follow to unshare and protect your sensitive data. Read it today to learn the must-follow enterprise encryption best practices!

2015 Data Breaches - Breach Level Index Report

In 2015, data breaches got much more personal than in previous years. While cybercriminals made headlines stealing credit card data and financial information in 2013 and 2014, the theft of personal information and identities took center stage in 2015.

Gemalto's Breach Level Index tracked the publicly disclosed breaches from around the world, and this report presents the 2015 key findings.

You'll want to read this report if you're interested in learning: 

  • The rate at which data records were lost and/or stolen in 2015
  • The industries that improved the most from 2014 in terms of breach incidents as well as those that were most impacted by 2015 breaches
  • The leading sources of data breaches
  • The types of data the cyber attacks compromised 
  • The areas around the globe that suffered the most data breaches
  • What all of the above means for data security going forward

 

In Control at Layer 2: A Tectonic Shift in Network Security - White Paper

Compared to IPSec (Layer 3), Layer 2 secure encryption can boost network performance by up to 50%. This paper outlines the shift, and looks at the drivers and benefits of Layer 2 encryption.

(135 resources found) Page:   1 2 3 4 5 6 7 8 9 10