Contact Us

Buscar recursos

Refine Search


No category specified.

Biblioteca de recursos

Featured Resources

  • Featured

    White Paper - From Software Hack to Counterattack

    A software publisher's guide to protecting software products against the top 8 piracy threats

  • Featured

    Reducir los gastos y el esfuerzo de cumplimiento PCI con la tokenización transparente de SafeNet

    La tokenización se está generalizando en distintas organizaciones y sectores. Al 
    eliminar de manera efectiva los datos de la industria de las tarjetas de crédito 
    (PCI, por sus siglas en inglés), la tokenización presenta una serie de beneficios 
    y ayuda a las organizaciones a mejorar su seguridad y reducir sus gastos y 
    esfuerzos de cumplimiento PCI. Este documento ofrece una visión detallada de la 
    tokenización así como orientaciones prácticas para ayudar a las organizaciones a 
    emplear con éxito la tokenización para maximizar sus beneficios potenciales.


Most Recent Alphabetical

IDBridge K50 - Solution Brief

With SafeNet Sentinel HL Drive, Virtualware Protects and Monetizes their Software - Case Study

Virtualware Group is a business group of technology companies that specializes in the development of hardware and software solutions based on immersive and interactive technologies.

License and Entitlement Management in the Era of the Internet of Things - White Paper

Xsens Technologies Streamlines Operations & Expands Revenue with Sentinel - Case Study

Xsens is a leading innovator in 3D motion tracking technology and products. To protect the sensitive IP contained in its software code and to guard against piracy, Xsens deployed a commercial software protection technology. Over time, the company realized that they needed a more robust solution. One that not only offered strong security for its IP, but also offered more comprehensive licensing and entitlement management capabilities to streamline operations and help grow its business. Xsens chose Sentinel.

Sentinel Fit - Product Brief

Sentinel Fit delivers award-winning software protection features combined with sophisticated, webbased entitlement management capabilities. Sentinel Fit is ideal for embedded systems; supporting virtually all boards and microcontrollers and is free from CPU and operating system constraints.

Bluetooth Smart - Solution Brief

A Comprehensive Guide to Securing Data with Database Encryption

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. This paper offers a detailed look at why the demand for database encryption is growing more critical and more challenging to contend with. The paper offers an overview of the key approaches required to address this increased demand, and it outlines the different types of encryption approaches—helping managers ensure they’re using the right tools for the right purposes. Finally, this paper offers a look at Gemalto’s portfolio of SafeNet Data Protection solutions, and reveals how these solutions enable security teams to address their database security objectives in an efficient, holistic manner.

Topics covered:

  • Why the Demand for Database Encryption is Growing, and Growing More Difficult

  • Determining How to Encrypt Database Data

  • Solutions for Protecting Select Columns in Databases

  • Solutions for Protecting the Entire Database File

  • Robust, Centralized Enterprise Key Management

(97 resources found) Página:   1 2 3 4 5 6 7 8 9 10