Skip to main content

Managed Service Providers (MSPs): Encryption & Key Management for Your Customers

X
Home

Search

  • Contact us
  • Blog
  • Documentation
  •  

Main navigation

  • Products
    • Enterprise Key Management Server (KMS)
      • VMware
      • Microsoft Azure
      • Amazon Web Services (AWS)
      • VMware Cloud on AWS
      • IBM Cloud for VMware
    • Database & Storage Encryption Key Management
      • SQL Server
      • MongoDB
      • vSphere and vSAN
      • NetLib Encryptionizer
      • Drupal
      • Edge Computing
      • MySQL
    • IBM i Security Solutions
      • Syncsort has acquired Townsend Security's IBM i security solutions.
  • Pricing
  • Resources
  • Developers
  • Partners
  • Support
  • GET STARTED
Home
  • Products
    • Enterprise Key Management Server (KMS)
      • VMware
      • Microsoft Azure
      • Amazon Web Services (AWS)
      • VMware Cloud on AWS
      • IBM Cloud for VMware
    • Database & Storage Encryption Key Management
      • SQL Server
      • MongoDB
      • vSphere and vSAN
      • NetLib Encryptionizer
      • Drupal
      • Edge Computing
      • MySQL
    • IBM i Security Solutions
      • Syncsort has acquired Townsend Security's IBM i security solutions.
  • Pricing
  • Resources
  • Developers
  • Partners
  • Support

Resources

Looking for specific information? Use our search below to find what you're looking for.

Podcast

Podcast: Protecting Data with vSphere & vSAN Encryption

Learn about vSphere and vSAN encryption, deploying multiple, redundant key servers as a part of the KMS Cluster configuration for maximum resilience and high availability, as well as meeting compliance regulations and security best practices for your organization.

Solution Brief

Solution Brief: Alliance Key Manager for vSphere

VMware users can protect VM Images and vSAN with with Alliance Key Manager, Townsend Security’s FIPS 140-2 compliant encryption key manager.
 

Webinar

Webinar: MongoDB Enterprise Security - Encryption and Key Management

By leveraging the WiredTiger storage engine and KMIP in MongoDB Enterprise, securing customer data, protecting IP, and meeting compliance requirements (PCI DSS, HIPAA, GDPR, etc.) is painless. 

Case Study

Case Study: Lockr Case Study

With easy and flexible deployment options, Alliance Key Manager has allowed Lockr to offer affordable secrets management to Drupal and WordPress users.

White Paper

White Paper: Encryption Key Management System vs Service - KMS Differences Explained

In IT technology and security, the language and three-letter acronyms we use can sometimes make things more confusing than they need to be. That’s true with encryption key management systems and services that are available today. So let’s sort out the language, TLAs, and try to reduce some of the confusion in this area.  

Podcast

Podcast: GDPR, Encryption, & Right of Erasure

The European General Data Protection Regulation (GDPR) is radically transforming the information technology space. Organizations of all sizes and types, and cloud service providers large and small, must adjust to the notion that people now fully own information about themselves.

Webinar

Webinar: Securing MongoDB with Encryption & Key Management

Learn how you can use the WiredTiger storage engine and KMIP in MongoDB Enterprise, to easily secure customer data, protect IP, and meet compliance requirements (PCI DSS, HIPAA, GDPR). 

eBook

eBook: The Definitive Guide to MongoDB Encryption Key Management

This definitive guide covers the critical issues involved in getting encryption right with MongoDB Enterprise.

White Paper

White Paper: What Data Needs Encrypted in MongoDB?

Generally speaking, you should encrypt any information that alone, or when combined with other information, can identify a unique, individual person. This is called Personally Identifying Information, or PII. 

Podcast

Podcast: IBM i, Two Factor Authentication, and PCI DSS

Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements.

Pagination

  • First page « First
  • Previous page ‹ Previous
  • Page 1
  • Page 2
  • Page 3
  • Current page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Next page Next ›
  • Last page Last »

Connect +1.877.869.6763

  • mastodon
  • youtube
  • facebook
  • twitter
  • linkedin

Footer menu

  • Encryption
    • Applications
    • Cloud
    • Databases
    • Languages
    • Platforms
    • Virtualization
    • Web
  • Key Management
    • Applications
    • Databases
    • Platforms
  • Partners
    • Become a Partner
    • Partner Center
    • Resellers
    • Technology Partners
  • Resources
    • Blog
    • Case Studies
    • Data Sheets
    • Podcasts
    • Solution Briefs
    • Webinars
    • White Papers
    • eBooks
    • Documentation
  • Company
    • About Us
    • Employment
    • Validations
    • Community Giving
    • Contact
    • Legal/Privacy
  • Compliance
    • PCI DSS
    • HIPAA/HITECH
    • EU General Data Privacy Regulation (GDPR)
    • FERPA
    • FISMA
    • State Privacy