After The Breach – Executive Overview | SafeNet
A new world order for authentication and data protection. Executive overview.
Best Practices in Identity Management | SafeNet | March 15
What to consider when selecting a PKI security solution.
The increasingly prevalent use of data protection mechanisms in today’s enterprises has posed significant implications. One of the most profound challenges relates to key management, and its associated complexity and cost. Written for business leadership and security architects, this paper looks at the past, present, and future of key management, revealing how emerging trends and approaches will ultimately enable enterprises to optimize both efficiency and security in the management of key materials.
Importance of Key Management for Storage Security | Gemalto | April 15
Over the last few years, as the requirements for data confidentiality and privacy have been magnified, encryption of stored data in the enterprise has become a much more compelling value proposition. In turn, many discrete storage encryption solutions, along with their customized key management systems, have been, and continue to be, implemented.
Managing at Cloud Speed | SafeNet & Saugatuck | Oct 10
What ISVs Need to Know and Change In Moving to The Cloud