Own Your Encryption Keys—and Prove Control of Your Data in…
Posted on 19 February 2015 by
The sole entity responsible for the security of the data is YOU—from the moment you take possession of it to the moment it’s deleted. No exceptions.
Posted on 19 February 2015 by
The sole entity responsible for the security of the data is YOU—from the moment you take possession of it to the moment it’s deleted. No exceptions.
Posted on 23 February 2015 by
SafeNet solutions now give you the ability to encrypt sensitive workloads in the IBM SoftLayer cloud platform and own and manage your keys
Posted on 13 April 2015 by
If you’ll be attending RSA Conference 2015, not only do you have the chance to hear from some of our security experts, but we’re also proud to host many representatives from our partners.
Posted on 15 June 2015 by
Recently I was pleased to emcee Gemalto’s second annual APAC Cipher Partner Summit in Phuket, Thailand with attendance from more than 110 partners from around the region. For three days we shared presentations on our data and identity protection solutions, exchanged ideas and best practices, networked with peers, and celebrated our valuable collaboration together on […]
Posted on 30 June 2015 by
This begins a series of blog posts about how to address data security in the AWS cloud environment with the SafeNet product line from Gemalto. Topics that will be addressed include: how to store data in the AWS cloud with customer-owned encryption, roots of trust, the importance of secure key management, encryption and pre-boot authentication […]
Posted on 30 July 2015 by
This is the second in a series of blog posts about how to address data security in the AWS cloud environment with the SafeNet product line from Gemalto. Topics that will be addressed include: how to store data in the AWS cloud with customer-owned encryption, roots of trust, the importance of secure key management, encryption […]