IDBridge K50 - Solution Brief
With SafeNet Sentinel HL Drive, Virtualware Protects and Monetizes their Software - Case Study
Virtualware Group is a business group of technology companies that specializes in the development of hardware and software solutions based on immersive and interactive technologies.
License and Entitlement Management in the Era of the Internet of Things - White Paper
Xsens Technologies Streamlines Operations & Expands Revenue with Sentinel - Case Study
Xsens is a leading innovator in 3D motion tracking technology and products. To protect the sensitive IP contained in its software code and to guard against piracy, Xsens deployed a commercial software protection technology. Over time, the company realized that they needed a more robust solution. One that not only offered strong security for its IP, but also offered more comprehensive licensing and entitlement management capabilities to streamline operations and help grow its business. Xsens chose Sentinel.
Sentinel Fit - Product Brief
Sentinel Fit delivers award-winning software protection features combined with sophisticated, webbased entitlement management capabilities. Sentinel Fit is ideal for embedded systems; supporting virtually all boards and microcontrollers and is free from CPU and operating system constraints.
Bluetooth Smart - Solution Brief
A Comprehensive Guide to Securing Data with Database Encryption
Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. This paper offers a detailed look at why the demand for database encryption is growing more critical and more challenging to contend with. The paper offers an overview of the key approaches required to address this increased demand, and it outlines the different types of encryption approaches—helping managers ensure they’re using the right tools for the right purposes. Finally, this paper offers a look at Gemalto’s portfolio of SafeNet Data Protection solutions, and reveals how these solutions enable security teams to address their database security objectives in an efficient, holistic manner.
Why the Demand for Database Encryption is Growing, and Growing More Difficult
Determining How to Encrypt Database Data
Solutions for Protecting Select Columns in Databases
Solutions for Protecting the Entire Database File
Robust, Centralized Enterprise Key Management