Contact Us

Buscar recursos

Refine Search

Product

No category specified.

Biblioteca de recursos

Featured Resources

  • Featured

    Reducir los gastos y el esfuerzo de cumplimiento PCI con la tokenización transparente de SafeNet

    La tokenización se está generalizando en distintas organizaciones y sectores. Al 
    eliminar de manera efectiva los datos de la industria de las tarjetas de crédito 
    (PCI, por sus siglas en inglés), la tokenización presenta una serie de beneficios 
    y ayuda a las organizaciones a mejorar su seguridad y reducir sus gastos y 
    esfuerzos de cumplimiento PCI. Este documento ofrece una visión detallada de la 
    tokenización así como orientaciones prácticas para ayudar a las organizaciones a 
    emplear con éxito la tokenización para maximizar sus beneficios potenciales.

  • Featured

    White Paper - From Software Hack to Counterattack

    A software publisher's guide to protecting software products against the top 8 piracy threats

SORT BY:

Most Recent Alphabetical

License and Entitlement Management in the Era of the Internet of Things - White Paper

A Comprehensive Guide to Securing Data with Database Encryption

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. This paper offers a detailed look at why the demand for database encryption is growing more critical and more challenging to contend with. The paper offers an overview of the key approaches required to address this increased demand, and it outlines the different types of encryption approaches—helping managers ensure they’re using the right tools for the right purposes. Finally, this paper offers a look at Gemalto’s portfolio of SafeNet Data Protection solutions, and reveals how these solutions enable security teams to address their database security objectives in an efficient, holistic manner.

Topics covered:

  • Why the Demand for Database Encryption is Growing, and Growing More Difficult

  • Determining How to Encrypt Database Data

  • Solutions for Protecting Select Columns in Databases

  • Solutions for Protecting the Entire Database File

  • Robust, Centralized Enterprise Key Management

Preparing for the General Data Protection Regulation - White Paper

How Core to Edge Security Can Boost Banks' Competitiveness in Disrupted Markets - White Paper

Cloud-Based Software Licensing: Enabling Operational Efficiency, Delighted Customers and Sustainable Competitiveness - White Paper

A white paper exploring software monetization strategies for the digital world

A4 Authentication for Mobile Employees eBook

Las empresas pueden observar algunas directrices importantes, como se describen en este folleto electrónico, para brindar a sus empleados una movilidad práctica, segura, escalable, compatible y rentable. 

How to Protect & Monetize Android Apps - White Paper

The advent of mobile computing via smartphone, tablets, and wearable computing technology has given way to masses of mobile applications or “apps,” as they’re commonly referred to.

(33 resources found) Página:   1 2 3 4 5