Skip Navigation

Cross Domain Solutions

Uniting Need-to-Know with Need-to-Share

Attendees of this webcast learned how the MDeX System addresses mission-critical areas such as:

  • Cyber Security Situational Awareness
  • Disaster Response
  • Supply Chain Security
  • Defense and Intelligence Coordination
  • Cloud Assurance
  • Big Data Analytics

Download Now


Cryptographic Key Management

High Assurance Security for Your Critical Applications

Attendees of this F5 | SafeNet webcast learned how to secure and optimize the delivery of enterprise applications, including how F5's BIG-IP System integrated with SafeNet's Luna SA HSM can:

  • Deliver high performance processing
  • Provide robust security
  • Meet compliance standards
  • Secure the transport layer while improving data center performance

Download Now

High-Assurance Encryption: Key Security Best Practices

Attendees of this webcast learned how to protect cryptographic keys by easily integrating hardware security modules to applications in order to secure:

  • PKI/Certificate Services
  • Database and File Encryption
  • Web Services
  • Cloud Services

 

Download Now

How to Prevent DNS Attacks Without Increasing the Administrative Burden

Attendees of this learned how to easily deploy a cost-effective DNSSEC solution that does not increase the burden on DNS administrators and:

  • Boosts security
  • Reduces costs
  • Controls access
  • Maintains application integrity
  • Scales to accommodate high volume processing

 

Download Now

High Assurance Digital Signature Solutions

Attendees of this webcast learned how you can employ a hardware-based digital signature solution to ensure the validity of critical documents with an easy-to-deploy, high-assurance solution using Adobe® LiveCycle® and SafeNet's Luna SA Hardware Security Module, including how to:

  • Guarantee signer authenticity and data integrity
  • Streamline business processes
  • Reduce costs associated with traditional paper-based processes
  • Ensure legal compliance

 

Download Now

Securing Self-Encrypting Drives

 

Attendees of this webcast learned why securing encryption keys in a dedicated hardware key manager better protects your data. During this time, we discussed:

  • Vulnerabilities of storing keys on a server
  • Benefits of external hardware key management
  • Importance of separating administrative duties

 

Download Now

Reduce Risk and the Administrative Nightmare: Key Management for Storage Encryption

 

Attendees of this webcast learned more about the:

  • Administrative burden required to manage fragmented key stores and associated lifecycle operations
  • Inability to provide a consistent policy across multiple encryption solutions
  • Importance of enhanced key protection (FIPS 140-2 Level 3) and governance across key lifecycles

 

Download Now

Enterprise Key Management: Who's Protecting Your Keys?

Attendees of this webcast learned why enterprise key management is a vital component of a robust data security architecture enabling you to:

  • Protect data against physical theft of disk drives
  • Meet compliance and/or audit mandates
  • Protect intellectual property in multi-tenant environments
  • Secure data located in disaster recovery sites
  • Refresh legacy key management solutions
  • Maintain high performance and availability of user files

 

Download Now

How NOT to Make the Headlines - Encrypt Your Mission Critical Data

Attendees of this webcast learned how encryption provides a trusted storage security solution for:

  • Data isolation in multi-tenant environments
  • Privileged user risk mitigation
  • Compliance
  • Archived data and intellectual property protection

 

Download Now


Data-at-Rest Encryption

Step-by-Step Guide to Data at Rest Protection (Part 1)

 

Attendees of this webcast learned more about the three-step process to effective data at rest protection. During this time we discussed:

  • How to identify your high value data assets and create a plan to protect them
  • Different encryption methods for structured and unstructured data
  • Importance of key management

 

Download Now

Best Practices for Protecting High Value Data-at-Rest (Part 2)

 

Attendees of this webcast learned about best practices for protecting high value data-at-rest, including:

  • Implementing dynamic encryption for data-at-rest protection
  • Centralizing key management to secure and manage encryption keys
  • Separating server administration responsibility from data access and key management

 

Download Now


High Speed Encryption

Best Practices for Data-in-Motion Security

 

Attendees of this webcast learned about best practices for high speed network encryption. During this time, we explored:

  • Benefits of layer 2 network encryption
  • Utilizing transmission security to protect data in motion
  • Protecting closed-circuit television and video surveillance transmissions
  • Securing point-to-point and point-to-multi point communications

 

Download Now

Network Metadata: Exposure Risks and Remedies

 

Attendees of this webcast learned about best practices for protecting high value data-at-rest, including:

  • Implementing dynamic encryption for data-at-rest protection
  • Centralizing key management to secure and manage encryption keys
  • Separating server administration responsibility from data access and key management

 

Download Now

Best Practices for Layer 2 Network Encryption

est Practices for Layer 2 Network Encryption

Attendees of this webcast learned the best practices for Layer 2 network encryption, such as:

  • Protecting networks from fiber tapping threats and private VLAN vulnerabilities
  • Complying with mandates
  • Implementing flexible, future-proof designs
  • Ensuring performance and efficiency
  • Employing a cost effective solution

 

Download Now


Authentication

Authentication Beyond PIV and CAC: Compliance in a Mobile Work Environment

 

Attendees of this webcast learned about next generation authentication methods that provide secure access to networks and applications from a variety of devices while ensuring compliance. We also discussed:

  • FISMA Compliance & Electronic Authentication Guidelines
  • HSPD-12 Compliance & PIV Derived Credentials for Remote Identity Populations

 

Download Now


Cloud Security

Is Your Virtual Data Center Leaking Your Secrets?

Attendees of this webcast learned how to easily secure data in a virtual environment through encryption in order to:

  • Ensure compliance with regulations and security policies
  • Protect directory services and intellectual property
  • Secure data in disaster recovery sites

 

Download Now


Healthcare

Best Practices for Protecting PHI Data

Attendees of this SafeNet Assured Technologies, Carahsoft, Emergent and V3Gate webinar learned how to apply the Encrypt Everything philosophy to protect PHI data. We broke down the HIPAA mandate and taught participants how to implement best practices to address key regulations, such as:

  • Workforce and workplace security
  • Information access management
  • Contingency plans
  • Personal and entity authentication 
  • Transmission security 

Download Now

Resources

Connect with us

Learn more about our products, solutions and services Contact SafeNet AT