Latest Content From SafeNet

Whitepaper: Secure the Breach Manifesto

by SafeNetApr 23, 2015

As hackers continue to successfully conduct large-scale attacks against financial services, retail and entertainment companies, organizations must rethink their security strategy. No longer are network firewalls and other perimeter “breach-prevention” technologies good enough. Many enterprises today rely on these technologies as the foundation for their data security strategy and unfortunately there is no fool-proof way to prevent a breach from occurring. This paper outlines SafeNet’s 3 step

Whitepaper: Authentication Best Practices: Put Control Where It Belongs

by SafeNetApr 23, 2015

A significant number of high profile security breaches have occurred recently, bringing the organizations affected to the front pages of the business press. These events have had a negative impact on the public image of these companies, and may also have had a negative impact on their business. Due to these incidents, CIOs of many organizations have had to re-evaluate their info-security strategy in general, while also placing specific focus on their user authentication and transaction security

Whitepaper: The Current State of Encryption and Key Management: Where Security Gaps Persist - Strategies for Addressing Them

by SafeNetApr 23, 2015

While encryption has been employed for decades, there has never been a higher need than in today’s market with data breaches consistently littering the headlines. As more organizations adopt encryption strategies many questions are posed.

Where is encryption being employed today and why?

Where do security practitioners see encryption’s usage increasing?

What do current usage trends tell us about existing security gaps, and how should those weaknesses be

Whitepaper: Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed

by SafeNetApr 23, 2015

Security professionals are living in a time of rapid and fundamental change. Computing and delivery models, user platforms and devices, and security threats have changed radically in recent years. However, in many ways, the security technologies and approaches employed by many organizations have remained relatively static, sometimes leading to disastrous results. To gain a picture of how organizations are contending with the changing technology and security landscape, SafeNet undertook an

Whitepaper: The Failure of Cloud Information Governance: A Global Data Security Study

by SafeNetApr 23, 2015

As technology evolves, more and more organizations are moving applications and data to the cloud. Although cloud solutions can save money and improve accessibility for remote users, it can also leave your sensitive data vulnerable to new security threats. With the lack of governance policies and security practices for the transition to cloud computing, it is important to consider how this move can affect your organization’s security. Ponemon Institute conducted a survey sponsored by SafeNet, to

Whitepaper: Guidelines for Choosing an Advanced Authentication Solution for Accessing Criminal Justice Information System (CJIS) Services

by SafeNetOct 15, 2013

For law enforcement agencies, timely information sharing is critical for stopping and reducing crime. Criminal Justice Information (CJI) is shared at all levels starting at the federal level through state and even municipal local agencies. With the crucial need to share CJI comes the need to protect this sensitive information, the leakage of which can affect the effectiveness of ongoing crime fighting operations.
The Criminal Justice Information Services (CJIS) Security Policy defines the

Whitepaper: Delivering High-Assurance Payment Applications that are Compliant with the Point-to-Point Encryption Standard

by SafeNetOct 15, 2013

Payment Card Industry Point-to-Point Encryption (P2PE) standards provide detailed guidelines for building payment processing solutions that safeguard payment data at all times. In establishing the security mechanisms required to comply with P2PE, hardware security modules (HSMs) play a critical role. This paper presents service providers with detailed insights for finding an HSM that offers optimal support for their P2PE compliance and business objectives.

Whitepaper: Maximizing Opportunities by Mitigating Risks

by SafeNetOct 15, 2013

The use of PINs in financial services has been around for decades. Over this time, the payments industry has evolved quite dramatically, but in some respects, not much has changed. This is particularly true for PIN issuance, where the same paper-based processes used decades ago are still the standard. This paper examines the current options for PIN issuance, and it offers insights for implementing PIN issuance processes that offer the best combination of convenience, cost efficiency, and

Whitepaper: Reducing PCI Compliance Costs and Effort with SafeNet Transparent Tokenization

by SafeNetAug 10, 2010

?How good is good enough? For companies regulated by the Payment Card Industry Data Security Standard (PCIDSS), the question remains, even after a successfully completed audit. The very next day a new system may be installed, a new threat discovered, a new user added, a new patch released. If an audit is passed and a breach occurs, the impact would still potentially be devastating.

Business and security leaders must constantly strive to find a balance, weighing budget allocations,

Whitepaper: Charting Your Path to Enterprise Key Management

by SafeNetAug 10, 2010

Steps to Take Today for a More Efficient, Secure Key Infrastructure

The increasingly prevalent use of data protection mechanisms in today?s enterprises has posed significant implications. Enterprises today need to balance several equally critical business mandates:

Strengthen security. Businesses need to enhance data security to minimize the risk of loss or breach of sensitive, personally identifiable information of patients, customers, or employees. Companies must also