Contact Us

Search Resources

Refine Search

Product

No category specified.

Resource Library

Featured Resources

  • Featured

    After The Breach - Executive Overview - White Paper

    Highly visible security breaches and their subsequent impact in almost every industry have changed the way companies are thinking about and implementing security measures.

  • Featured

    White Paper - Overcoming Java Vulnerabilities

    Overcoming Java Vulnerabilities to Code Manipulation, Reverse Engineering and Theft White Paper

SORT BY:

Most Recent Alphabetical

Secure the AWS Cloud with SafeNet Solutions - eBook

While cloud storage offers customers increased flexibility and availability as well as decreased costs, data owners must be able to demonstrate compliance and illustrate control of sensitive information stored in the cloud. As data owners, organizations are often required to prove that they can meet compliance requirements and keep safe sensitive data stored in cloud environments such as credit card numbers, health records, or other personally identifiable information. The question is: how?

global-study-state-payment-data-security

 

The global study on the State of Payment Data Security Study was conducted on behalf of gemalto by the Ponemon Institute. Research reveals IT professionals believe the risk to payment data is increasing because of new payment methods.

Ethernet WAN Encryption Solution Compared - White Paper

This White Paper describes the comparative security and performance benefits of Ethernet WAN data security solutions. We compare the benefits of Gemalto SafeNet Layer 2 high speed encryption hardware with integrated encryption using MACsec or TrustSec.

Best Practices for Credential Management - White Paper

When deploying a solution in which cryptographic keys are stored in, and never exist in the clear outside of, a secure hardware platform, a question commonly asked is “How does one protect the credentials that are used to access and use the keys within the hardware?”

Data Breaches and Customer Loyalty Report

This report presents the key findings from a recent global survey of consumers conducted by Gemalto on the impacts of data breaches on customer loyalty.

Payment Card Security - White Paper

With the rising incidence of threats to consumer data, and increasing requirements to protect that data, merchants must focus on their security infrastructure. Regulations have been implemented not only by the state and federal governments, but by the credit card industry as well. Companies are compelled to prove their compliance with these regulations and will be held liable for their failure to do so. While these rules focus on protecting the consumer, they also serve as protection for the merchant, as security breaches can have a far-reaching impact to both a company’s finances and reputation.

A Comprehensive Guide to Securing Data with Database Encryption

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. This paper offers a detailed look at why the demand for database encryption is growing more critical and more challenging to contend with. The paper offers an overview of the key approaches required to address this increased demand, and it outlines the different types of encryption approaches—helping managers ensure they’re using the right tools for the right purposes. Finally, this paper offers a look at Gemalto’s portfolio of SafeNet Data Protection solutions, and reveals how these solutions enable security teams to address their database security objectives in an efficient, holistic manner.

Topics covered:

  • Why the Demand for Database Encryption is Growing, and Growing More Difficult

  • Determining How to Encrypt Database Data

  • Solutions for Protecting Select Columns in Databases

  • Solutions for Protecting the Entire Database File

  • Robust, Centralized Enterprise Key Management

(181 resources found) Page:   1 2 3 4 5 6 7 8 9 10