IBM i Security Solutions: Syncsort Acquires Townsend Security IBM i Products
Looking for specific information? Use our search below to ﬁnd what you're looking for.
By knowing the relationship of HIPAA and HITRUST, covered entities and business associates can better understand their requirements for protecting ePHI.
Security administrators and application developers need to take a data-centric approach to protecting their private information – such as their employee data, intellectual property (IP), or customers’ PII.
While creating encrypted backup tapes is an excellent practice, for many organizations it is often the only time their data gets encrypted.
Meeting data privacy compliance regulations doesn't need to be complex or costly - as long as you are using the correct encryption key management tools.
Expensive encryption and key management solutions, losing encryption keys, and difficult deployments are now a thing of the past.
If you are protecting your Personal Health Information (PHI) with proper encryption and key management, you are exempt from a breach notification.
Colleges and universities have become a target for data thieves and are suffering an increased number of data breaches.
Property Management Systems (PMS) contain a deep well of PII - such as credit card numbers, phone numbers, email addresses, etc. - which is often not properly secure - leaving users at risk for a breach.
Data security is a huge concern for retail companies who expect their point of sale (POS) system vendors to protect their customers’ data.
When developing a data breach response plan it is important to consider the technologies you can implement to help mitigate a data breach, or prevent one from happening altogether.