All resources sponsored by:

SafeNet, Inc.

25 Matches
Storage Security Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW:This white paper introduces SafeNet StorageSecure, a network storage encryption appliance that protects data at rest.
Posted: 15 Dec 2014 | Published: 02 Jun 2011
Get This Now


Hardware Security Module (HSM) Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW:This white paper introduces SafeNet's Luna SA, made for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.
Posted: 15 Dec 2014 | Published: 09 Apr 2013
Get This Now


A Centralized Key Management Solution for Your Enterprise's Security Needs
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW:This white paper introduces SafeNet KeySecure: A single, centralized platform for managing cryptographic content (keys and related data) and applications, capable of running in on premise, cloud, or hybrid environments.
Posted: 15 Dec 2014 | Published: 18 Jul 2014
Get This Now


Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW:This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014
Get This Now


Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER:This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014
Get This Now


eBook: How to Secure a Data Breach
sponsored by SafeNet, Inc.
EBOOK:This e-book describes what the future of data breaches will look like for organizations around the world, and lists the three major steps that all enterprises need to take in order to protect their sensitive data.
Posted: 15 Dec 2014 | Published: 30 Jun 2014
Get This Now


Sensitive Data Is Everywhere, So Data Protection Should Be, Too
sponsored by SafeNet, Inc.
WHITE PAPER:This infographic helps you to think about where your data and keys are located and who has access to them, and also presents one company's data protection portfolio, which provides persistent protection of sensitive information at all critical points in its lifecycle.
Posted: 15 Dec 2014 | Published: 15 Dec 2014
Get This Now


Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER:This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013
Get This Now


A New Security Reality: The Secure Breach
sponsored by SafeNet, Inc.
WHITE PAPER:This informative white paper explains why our focus needs to shift from preventing breaches to accepting that they're inevitable, and aiming to ensure that when a breach does occur, critical data remains secure.
Posted: 12 Dec 2014 | Published: 24 Apr 2014
Get This Now


6 Vulnerabilities of the Retail Payment Ecosystem
sponsored by SafeNet, Inc.
WHITE PAPER:This white paper explains the risks involved in each step of the retail payment process and provides practical solutions for each, including manipulating software updates, exploiting weak passwords, and more.
Posted: 11 Dec 2014 | Published: 11 Dec 2014
Get This Now


Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER:This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013
Get This Now


Data Security is Stormy in the Cloud
sponsored by SafeNet, Inc.
WHITE PAPER:This infographic presents a variety of informative statistics on the widespread struggle to keep data safe in the cloud.
Posted: 11 Dec 2014 | Published: 11 Dec 2014
Get This Now


Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER:This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014
Get This Now


How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER:This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014
Get This Now


6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER:In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014
Get This Now


In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER:This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
Get This Now


The Token is Dead. Long Live the Token
sponsored by SafeNet, Inc.
WEBCAST:View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
Posted: 17 Aug 2011 | Premiered: Aug 17, 2011
Get This Now


Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet, Inc.
WHITE PAPER:This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Posted: 27 Jul 2010 | Published: 27 Jul 2010
Get This Now


SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER:SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010
Get This Now


Considering Software Licensing and Entitlement Management: SafeNet's Life-Cycle Approach
sponsored by SafeNet, Inc.
WHITE PAPER:As a continuation of prior research, this white paper, commissioned by SafeNet, discusses IDC's findings on the best practices for the deployment of software licensing and entitlement management technologies.
Posted: 15 Jul 2010 | Published: 15 Jul 2010
Get This Now


Maintaining Control & Compliance in the Cloud with Data-Centric Security
sponsored by SafeNet, Inc.
WEBCAST:With promises of flexibility, ease of use, and lower costs, Service Oriented Architectures (SOA) and Virtualization are leading IT to the new outsourced computing model known as Cloud. This session will provide details on the impact of Cloud on information security and the data-centric solutions for specific use-cases.
Posted: 03 Jun 2010 | Premiered: Mar 3, 2010
Get This Now


Confidence in Commerce: Enabling e-banking and online services with two-factor authentication
sponsored by SafeNet, Inc.
WHITE PAPER:Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices.
Posted: 02 Nov 2009 | Published: 01 Sep 2009
Get This Now


The Future of Authentication for Online Services
sponsored by SafeNet, Inc.
WHITE PAPER:In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks.
Posted: 02 Nov 2009 | Published: 02 Nov 2009
Get This Now


Five Threats to Data Security and How to Protect against Them
sponsored by SafeNet, Inc.
WHITE PAPER:The purpose of this paper is to examine five specific risks to data security, showing where and how confidential data may be vulnerable - and how you can protect your business against these threats.
Posted: 10 Sep 2008 | Published: 10 Sep 2008
Get This Now


Rainbow Technologies Authentication eBook
sponsored by SafeNet, Inc.
BOOK:Understanding authentication/identity management should be the start of your company's security assessment.
Posted: 19 Jun 2002 | Published: 25 Mar 2002
Get This Now


25 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement