Skip Navigation

Cryptographic Key Management

Roots of Trust: Five Things You Must Know

The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptographic controls? Modern computer systems are incredibly powerful and flexible. They can be molded to accomplish things that were unimaginable a mere decade ago. This same property makes them almost impossible to control and all too easy for malicious actors to find ways to disrupt them. To counter these threats, security experts have resorted to a wide range of cryptographic tools, and for these tools to function they need a trust worthy beginning.

Download Now

Best Practices for Cryptographic Key Management

Once data is encrypted, the only way to gain access is by decrypting or unlocking secret content using the key. Haphazardly protecting these keys negates the entire process of encryption and creates a false sense of security. This white paper outlines best practices for deploying an effective cryptographic key managment strategy.

Download Now

Own and Manage Your Encryption Keys

For agency leaders and IT administrators responsible for data security—from the most basic statistics to highly sensitive documents—understanding the role of encryption and the management of encryption keys is vital to keeping confidential data just that—confidential. And, for organizations that entrust their data to cloud storage, it is essential that they understand the options available for safeguarding this protected data—even if it’s being managed in the cloud by a third-party vendor. This white paper discusses the importance of data encryption, the vulnerabilities of third-party encryption, the necessity of encryption key ownership, and how all of it affects the security of your organization’s data stored in the cloud.

Download Now

Securing Network-Attached HSMs Luna SA for Government Three-Layer Authentication Model

The Luna SA for Government uses a comprehensive three-layer authentication and access control model to achieve extremely strong security between the host application processes and the Luna SA for Government’s HSM partitions.This three-layer authentication and access control model was designed to allow the Luna SA for Government to offer network connectivity to clients without sacrificing the security requirements of HSM operations.

Download Now


Encrypt Everything eBook

Everyone wants their eyes on the data to reduce costs, improve efficiency, develop new products, optimize offerings, and to make smarter, data-driven decisions. To meet these demands, data will need be produced in more places, stored in more places, processed in more places, and ultimately, shared and distributed to more places. As an IT professional, this isn’t new news. You’re living it – and it’s quite the data protection dilemma. The thought of sharing your organization’s sensitive data outside of your brick and mortar location (and outside of your watchful eye) is a growing concern. So how do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats?

Download Now

Guide to Protecting Your Sensitive Data with Encryption White Paper

So, you need to encrypt your sensitive data? Your data is in high demand, and you know it needs data-centric protection. With so many encryption options available, how do you find the right solution to protect your organization's sensitive data?

Download Now

High Speed Encryption

Ethernet WAN Encryption Solutions Compared

This White Paper describes the comparative security and performance benefits of Ethernet WAN data security solutions. We compare the benefits of SafeNet Layer 2 high speed encryption hardware with integrated encryption using MACsec or TrustSec.

Download Now


As the old saying goes, “loose lips sink ships”. For today’s enterprises, it is network metadata doing the talking—and a lot of potentially dangerous entities are listening. This paper looks at the risks that metadata can pose to many organizations, and it reveals how transmission security can be used to create a safeguard against nefarious network traffic analysis.

Download Now

Best Practices for Securing Network Function Virtualization Environment WHITE PAPER

This white paper offers a detailed look at the unique security implications of adopting NFV approaches, and it provides a number of best practices to employ to ensure sensitive data and transmissions remain secure in these environments.

Download Now


Cybersecurity Sprint: Multi-Factor Authentication for Privileged Users

There are several challenges impeding adoption across federal agencies of PIV for privileged user access. Primarily, the time and cost required to migrate to PIV-enabled technologies for privileged user accounts can be unmanageable in the intermediate term. Pursuing technologies that support PIV-enablement of privileged user accounts is an evolutionary process and requires significant investment as systems are updated, replaced, or migrated. In many cases, this isn’t practical for legacy systems. Download this White Paper to learn why authenticators are proven and practical alternative to PIV.

Download Now


High Assurance Encryption for Healthcare Network Data

Healthcare IT infrastructure has become borderless; with clinicians, government agencies, advisory boards, independent consultants, office managers, patients and service providers connected via a wide range of devices. As healthcare stakeholders and systems become better connected, the volume of healthcare data created, processed, analyzed and stored is greater than ever. The increased use of HD video – either for collaboration or patient monitoring – is also changing the nature and format of healthcare data.

Download Now

HIPAA Compliance Checklist

The Health Insurance Portability and Accountability Act (HIPAA) regulates the use and disclosure of certain information held by health plans, health insurers, and medical service providers that engage in many types of transactions. SafeNet Assured Technologies can help address many of the critical challenges of ensuring the security of sensitive data adhering to health information privacy standards.

Download Now

Identity and Data Protection for Federal Healthcare Organizations

From medical records to insurance forms to prescription services, the healthcare industry has become a networked environment— allowing patient information to be shared and managed by a variety of parties and from a number of endpoints, each with their own level of security for protecting that information. Not only are healthcare organizations oftentimes mandated to protect this information from data breaches and fraud, but it is also imperative for the health of their practice that patients have confidence that their personal information remains private and secure.

Download Now

Securing Electronic Health Records in Storage

While HITECH provides ample incentives for healthcare organizations to employ EHR systems, it also builds on HIPAA to provide more stringent security and privacy rules. Therefore, healthcare organizations that leverage EHR systems must also ensure regulated information is consistently and effectively safeguarded—and do so for as long as that data must be retained, which can be decades in many cases. This paper reveals a key vulnerability that is prevalent in many organizations that have adopted EHR: regulated data held in digital storage systems. The paper also reveals how solutions offered by SafeNet Assured Technologies can help secure this critical area in the healthcare organization’s infrastructure.

Download Now


Continuous Diagnostics and Mitigation: Data Protection & Assurance

Acknowledging that cyber security is a monumental task, CDM has taken a structured approach by defining four phases that enable agencies to fold in different aspects of cyber security over time. The program begins with dashboards at both the federal and the agency/department level. The program then deploys sensors throughout the network infrastructure that address different strategic questions associated with network security.

Download Now

CJIS Data-in-Transit Encryption Standards

For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to ensure that the security mechanisms employed don’t in any way impede staff in fulfilling the agencies’ chief charter: fighting crime. This paper examines data-in-transit encryption, which is an important component of CJIS-SP requirements. It offers a number of insights into the approaches that can help organizations address data-in-transit encryption policies most efficiently and effectively—while ensuring that investigators and other users always get reliable, timely access to the information they need to do their jobs.

Download Now

FedRAMP ECSB Compliance Checklist

The Cloud First initiative is now a reality—civilian and defense agencies are being asked to default to cloud-based solutions when possible. In order to facilitate the transition to the cloud, the Federal Government has implemented the government-wide Federal Risk and Authorization Management Program (FedRAMP) to provide a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Download Now

Cipher Summit 2018 Replay

Check out the on demand videos and presentations from the event. Download Now

Connect with us

Learn more about our products, solutions and services Contact SafeNet AT