Contact Us

Ressources de recherche

Refine Search

Product

No category specified.

Bibliothèque de données

Featured Resources

  • Featured

    Reducing PCI Compliance Costs and Effort Transparent Tokenization - White Paper

    Reducing PCI Compliance Costs and Effort with SafeNet Transparent Tokenization White Paper 1 Reducing PCI Compliance Costs and Effort with SafeNet Transparent Tokenization WHITE PAPER Tokenization is gaining increased adoption in a range of organizations and industries. By effectively taking PCI data out of scope, toke

SORT BY:

Most Recent Alphabetical

Authenticated Network Access - F5 BIG-IP APM - Solution Brief

Today, employees, partners, and customers need to access corporate applications and data at all times and from any location, whether they are inside or outside the traditional security perimeter. For security administrators, the challenge lies in guaranteeing that only authorized users gain access to what could be sensitive corporate information.

Secure Your Network Traffic with F5 BIGIP and SafeNet Luna SA - Solution Brief

Downtime for corporate applications delivered through networks is not an option. Since organizations use these applications to generate revenue and manage operations, disruption and compromise directly impacts the bottom line.

A Comprehensive Guide to Securing Data with Database Encryption

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. This paper offers a detailed look at why the demand for database encryption is growing more critical and more challenging to contend with. The paper offers an overview of the key approaches required to address this increased demand, and it outlines the different types of encryption approaches—helping managers ensure they’re using the right tools for the right purposes. Finally, this paper offers a look at Gemalto’s portfolio of SafeNet Data Protection solutions, and reveals how these solutions enable security teams to address their database security objectives in an efficient, holistic manner.

Topics covered:

  • Why the Demand for Database Encryption is Growing, and Growing More Difficult

  • Determining How to Encrypt Database Data

  • Solutions for Protecting Select Columns in Databases

  • Solutions for Protecting the Entire Database File

  • Robust, Centralized Enterprise Key Management

License and Entitlement Management in the Era of the Internet of Things - White Paper

Xsens Technologies Streamlines Operations & Expands Revenue with Sentinel - Case Study

Xsens is a leading innovator in 3D motion tracking technology and products. To protect the sensitive IP contained in its software code and to guard against piracy, Xsens deployed a commercial software protection technology. Over time, the company realized that they needed a more robust solution. One that not only offered strong security for its IP, but also offered more comprehensive licensing and entitlement management capabilities to streamline operations and help grow its business. Xsens chose Sentinel.

Sentinel Fit - Product Brief

Sentinel Fit delivers award-winning software protection features combined with sophisticated, webbased entitlement management capabilities. Sentinel Fit is ideal for embedded systems; supporting virtually all boards and microcontrollers and is free from CPU and operating system constraints.

Preparing for the General Data Protection Regulation - White Paper

(62 resources found) Page:   1 2 3 4 5 6