Skip to main content

Managed Service Providers (MSPs): Encryption & Key Management for Your Customers

X
Home

Search

  • Contact us
  • Blog
  • Documentation
  •  

Main navigation

  • Products
    • Enterprise Key Management Server (KMS)
      • VMware
      • Microsoft Azure
      • Amazon Web Services (AWS)
      • VMware Cloud on AWS
      • IBM Cloud for VMware
    • Database & Storage Encryption Key Management
      • SQL Server
      • MongoDB
      • vSphere and vSAN
      • NetLib Encryptionizer
      • Drupal
      • Edge Computing
      • MySQL
    • IBM i Security Solutions
      • Syncsort has acquired Townsend Security's IBM i security solutions.
  • Pricing
  • Resources
  • Developers
  • Partners
  • Support
  • GET STARTED
Home
  • Products
    • Enterprise Key Management Server (KMS)
      • VMware
      • Microsoft Azure
      • Amazon Web Services (AWS)
      • VMware Cloud on AWS
      • IBM Cloud for VMware
    • Database & Storage Encryption Key Management
      • SQL Server
      • MongoDB
      • vSphere and vSAN
      • NetLib Encryptionizer
      • Drupal
      • Edge Computing
      • MySQL
    • IBM i Security Solutions
      • Syncsort has acquired Townsend Security's IBM i security solutions.
  • Pricing
  • Resources
  • Developers
  • Partners
  • Support

Resources

Looking for specific information? Use our search below to find what you're looking for.

White Paper

White Paper: Delivering Secure VMware Hosting with Encryption and Key Management

This white paper discusses how Townsend Security is helping VMware hosting providers and MSPs meet the challenge of encryption and encryption key management, while supporting the usage-based business model core to many of these hosting providers.

White Paper

White Paper: What Data Needs To Be Encrypted In MySQL?

Generally speaking, you should encrypt any information that alone, or when combined with other information, can identify a unique, individual person.

White Paper

White Paper: What Data Needs To Be Encrypted In The Blockchain

Generally speaking, you should encrypt any information that alone, or when combined with other information, can identify a unique, individual person.

White Paper

White Paper: Encryption Key Management System vs Service - KMS Differences Explained

In IT technology and security, the language and three-letter acronyms we use can sometimes make things more confusing than they need to be. That’s true with encryption key management systems and services that are available today. So let’s sort out the language, TLAs, and try to reduce some of the confusion in this area.  

White Paper

White Paper: What Data Needs Encrypted in MongoDB?

Generally speaking, you should encrypt any information that alone, or when combined with other information, can identify a unique, individual person. This is called Personally Identifying Information, or PII. 

White Paper

White Paper: Introduction to Encrypting Data in MongoDB

Learn how MongoDB users can achieve strong data security, along with options to secure and manage encryption keys to meet industry compliance requirements and meet data security best practices. 

White Paper

White Paper: Encryption Key Management in the AWS Cloud

While the AWS Key Management Service will help some better protect their sensitive data, it will not meet minimum standards and security requirements for many organizations.

White Paper

White Paper: AES Encryption Strategies - A White Paper for the IT Executive

This paper is for the CIO and IT Executive who makes decisions about data security on their Enterprise server platforms.

White Paper

White Paper: What Data Needs Encrypted in Drupal?

Download this white paper to learn what data needs to be encrypted, which compliance regulations require encryption, and how to encrypt data and manage encryption keys in Drupal.

White Paper

White Paper: Tokenization - A Cost-Effective and Easy Path to Compliance and Data Protection

This white paper discusses the ways in which tokenization is implemented, the effectiveness of tokenization in meeting regulatory requirements, and the impact on your IT systems and business processes.

Pagination

  • Current page 1
  • Page 2
  • Page 3
  • Next page Next ›
  • Last page Last »

Connect +1.877.869.6763

  • mastodon
  • youtube
  • facebook
  • twitter
  • linkedin

Footer menu

  • Encryption
    • Applications
    • Cloud
    • Databases
    • Languages
    • Platforms
    • Virtualization
    • Web
  • Key Management
    • Applications
    • Databases
    • Platforms
  • Partners
    • Become a Partner
    • Partner Center
    • Resellers
    • Technology Partners
  • Resources
    • Blog
    • Case Studies
    • Data Sheets
    • Podcasts
    • Solution Briefs
    • Webinars
    • White Papers
    • eBooks
    • Documentation
  • Company
    • About Us
    • Employment
    • Validations
    • Community Giving
    • Contact
    • Legal/Privacy
  • Compliance
    • PCI DSS
    • HIPAA/HITECH
    • EU General Data Privacy Regulation (GDPR)
    • FERPA
    • FISMA
    • State Privacy