Get SafeNet News

Search Resources

Refine Search


No category specified.

Resource Library

Featured Resources

  • Featured

    White Paper - Overcoming Java Vulnerabilities

    Overcoming Java Vulnerabilities to Code Manipulation, Reverse Engineering and Theft White Paper

  • Featured

    Reducing PCI Compliance Costs and Effort Transparent Tokenization - White Paper

    Tokenization is gaining increased adoption in a range of organizations and industries. By effectively taking PCI data out of scope, tokenization presents a host of benefits, helping organizations both boost security and reduce PCI compliance efforts and costs. This paper offers a detailed look at tokenization and offers practical guidelines for helping organizations successfully employ tokenization so they can maximize the potential benefits.


Most Recent Alphabetical

Gemalto SafeNet HSM and F5 BIG-IP Local Traffic Manager Performance Testing Overview

This paper presents findings from testing of up to 10 Gemalto SafeNet HSMs with an F5 BIG-IP 7200 appliance running TMOS version 11.6, and recommendations based on the results.

An Anchor of Trust in a Digital World - White Paper

Hardware security modules have become instrumental in the development of innovative products and services that are only possible through secure storage and use of digitized information.

Unshare and Secure Sensitive Data - Encrypt Everything eBook

We live in a world of sharing, and sometimes we share a little more than we should. Of course, we’re not only referring to social media posts here; this also includes what is happening with your corporate data assets too.

With your organization’s sensitive data being stored, sliced and diced, and shared more than ever before, you must have a way to keep it safe, especially in cloud and multi-tenant environments. Approved users and processes need to be able to leverage the data that’s available, while you ensure any high-value, sensitive information, such as intellectual property, personally identifiable information, and company financials, remains on lock down wherever it resides. 

We call this unsharing your data, and in our free ebook, we outline the steps enterprises need to follow to unshare and protect your sensitive data. Read it today to learn the must-follow enterprise encryption best practices!

Build the Trusted Connected Car - White Paper

While the connected car offers huge opportunities for drivers and associated businesses, the full measure of these gains won’t be realized without effective security.

As the connected car’s intelligence, services, and ecosystem expands, so do the potential risks and exposures. This paper offers a look at the opportunities and threats presented by the connected car, and it provides an overview of the keys to building a trusted ecosystem that enables continued innovation in the connected car segment—without jeopardizing driver privacy or safety.

Encryption as an IT Service - White Paper

Taking advantage of the “as-a-service” concept to make data encryption as simple as possible, IT can combine resources to provide their “customers” the ability to manage their encryption in a way that enables them to meet their data security and compliance requirements simply, cost-effectively, elastically, and, of course, securely.

Intro Crypto Command Center HSM Provisioning Cloud - White Paper

Businesses and organizations of all types and sizes are embracing virtualization and cloud computing concepts to make more efficient use of their own IT infrastructure and to expand their IT capabilities, as equired, by obtaining virtual computing resources from third-party providers. To realize maximum efficiency, all IT components should be manageable following the cloud computing model. Enter the SafeNet Crypto Command Center.

Charting Your Path to Enterprise Key Management - White Paper

(172 resources found) Page:   1 2 3 4 5 6 7 8 9 10