This 2012 Global Encryption Trends Report, based on the independent research by the Ponemon Institute, reveals that encryption continues to be viewed as a strategic issue and that organizations are increasing their investment in encryption across the enterprise in response to compliance regulations and...
This book provides an easy-to-understand introduction to protecting payment card data and a reference framework you can use as you work with architects, operations, analysts and assessors. This book covers not just the PCI DSS mandates themselves but also ways in which you can employ data protection techniques to...
Thales e-Security is pleased to present the 2011 Encryption Trends Study (United States) conducted by the Ponemon Institute. This study reveals how U.S. organizations are using encryption to protect their sensitive data and how the U.S. compares itself with other countries like Germany, United Kingdom, Brazil and...
In this white paper, Jon Oltsik, Principal Analyst at ESG, cuts through the hype and provides recommendations to protect your organization's data, with today's budget. Oltsik shows you where to start, how to focus on the real threats to data, and what actions you can take today to make a meaningful contribution to...
In today's banking world, the importance of a comprehensive, reliable and scalable security infrastructure has never been greater. Thales HSMs have been used for over 25 years by a large number of banks worldwide mainly to protect customer PINs during credit and debit card transaction processing.
More recently...
A new whitepaper on remote management for Thales HSM 8000 users
With data center consolidation, it is increasingly common for management of the data center to be at some other remote location. Flying HSM administrators to HSM locations to perform vital security functions which require their physical presence is...
Over the years, security and compliance experts at ReymannGroup have performed numerous compliance reviews and risk assessments. Through these engagements and other forums, we have engaged hundreds of executives in discussions about the need for a comprehensive and strategic approach to data security and compliance....
The modern corporation is using web based infrastructures in many ways to conduct business across the enterprise and around the globe. Whether it is with
customers, partners or employees, the Internet provides instant access and global reach at a fraction of the cost of traditional channels.
However, doing...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.