Contact Us

Buscar recursos

Refine Search

Product

Biblioteca de recursos

Results for Data Protection

SORT BY:

Most Recent Alphabetical

A Comprehensive Guide to Securing Data with Database Encryption

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. This paper offers a detailed look at why the demand for database encryption is growing more critical and more challenging to contend with. The paper offers an overview of the key approaches required to address this increased demand, and it outlines the different types of encryption approaches—helping managers ensure they’re using the right tools for the right purposes. Finally, this paper offers a look at Gemalto’s portfolio of SafeNet Data Protection solutions, and reveals how these solutions enable security teams to address their database security objectives in an efficient, holistic manner.

Topics covered:

  • Why the Demand for Database Encryption is Growing, and Growing More Difficult

  • Determining How to Encrypt Database Data

  • Solutions for Protecting Select Columns in Databases

  • Solutions for Protecting the Entire Database File

  • Robust, Centralized Enterprise Key Management

A4 Authentication for Mobile Employees eBook

Las empresas pueden observar algunas directrices importantes, como se describen en este folleto electrónico, para brindar a sus empleados una movilidad práctica, segura, escalable, compatible y rentable. 

Reducir los gastos y el esfuerzo de cumplimiento PCI con la tokenización transparente de SafeNet

La tokenización se está generalizando en distintas organizaciones y sectores. Al 
eliminar de manera efectiva los datos de la industria de las tarjetas de crédito 
(PCI, por sus siglas en inglés), la tokenización presenta una serie de beneficios 
y ayuda a las organizaciones a mejorar su seguridad y reducir sus gastos y 
esfuerzos de cumplimiento PCI. Este documento ofrece una visión detallada de la 
tokenización así como orientaciones prácticas para ayudar a las organizaciones a 
emplear con éxito la tokenización para maximizar sus beneficios potenciales.

Data Security: The Foundation for Compliance and Reduction of Compliance Spend - White Paper

1 Data Security -the Foundation for Compliance and Reduction of Compliance Spend An Encryption-based Roadmap to Unified Compliance 2 Disclaimer: This guide does not provide legal advice. Do not rely exclusively on this guide for advice on how to address regulatory requirements. For specific questions and guidance, cons

Top 10 Things to Know about SMS - White Paper

white paper SMS authentication: 10 Things to Know—Before You Buywhite paper SMS authentication Introduction Delivering instant remote access is no longer just about remote employees. its about enabling customers to perform online transactions, mobile sales reps to access erp applications, outsourced call centers to sha

Sustaining PCI Compliance in Cloud: 4 Key Requirements - White Paper

Sustaining PCI Compliance in the Cloud: 4 Key Requirements White Paper 1 Introduction For years now, journalists, analysts, vendors, and pretty much everyone else in the tech industry have been singing the praises of the cloud, touting such benefi ts as cost savings, enhanced service levels, unprecedented agility, and

Smart Phones and Tablets in the Enterprise - White Paper

Whether IT organizations choose to embrace, resist, or deny them, the reality is that the increased prevalence of mobile devices in the enterprise presents a range of fundamental implications. This paper examines the paradigm shifts taking place in enterprise IT organizations today, and then focuses on the key implications the proliferation of mobile devices has for authentication. The paper then uncovers some of the key strategies for making mobile authentication work effectively and securely in today’s IT environments.

(12 resources found) Página:   1 2