Skip to main content

Managed Service Providers (MSPs): Encryption & Key Management for Your Customers

X
Home

Search

  • Contact us
  • Blog
  • Documentation
  •  

Main navigation

  • Products
    • Enterprise Key Management Server (KMS)
      • Hardware Security Module (HSM)
      • VMware
      • Microsoft Azure
      • Amazon Web Services (AWS)
      • VMware Cloud on AWS
      • IBM Cloud for VMware
    • Database & Storage Encryption Key Management
      • SQL Server
      • MongoDB
      • vSphere and vSAN
      • NetLib Encryptionizer
      • Drupal
      • Edge Computing
      • MySQL
    • IBM i Security Solutions
      • Syncsort has acquired Townsend Security's IBM i security solutions.
  • Pricing
  • Resources
  • Developers
  • Partners
  • Support
  • GET STARTED
Home
  • Products
    • Enterprise Key Management Server (KMS)
      • Hardware Security Module (HSM)
      • VMware
      • Microsoft Azure
      • Amazon Web Services (AWS)
      • VMware Cloud on AWS
      • IBM Cloud for VMware
    • Database & Storage Encryption Key Management
      • SQL Server
      • MongoDB
      • vSphere and vSAN
      • NetLib Encryptionizer
      • Drupal
      • Edge Computing
      • MySQL
    • IBM i Security Solutions
      • Syncsort has acquired Townsend Security's IBM i security solutions.
  • Pricing
  • Resources
  • Developers
  • Partners
  • Support

Resources

Looking for specific information? Use our search below to find what you're looking for.

White Paper

White Paper: Encryption Key Management System vs Service - KMS Differences Explained

In IT technology and security, the language and three-letter acronyms we use can sometimes make things more confusing than they need to be. That’s true with encryption key management systems and services that are available today. So let’s sort out the language, TLAs, and try to reduce some of the confusion in this area.  

Podcast

Podcast: GDPR, Encryption, & Right of Erasure

The European General Data Protection Regulation (GDPR) is radically transforming the information technology space. Organizations of all sizes and types, and cloud service providers large and small, must adjust to the notion that people now fully own information about themselves.

Webinar

Webinar: Securing MongoDB with Encryption & Key Management

Learn how you can use the WiredTiger storage engine and KMIP in MongoDB Enterprise, to easily secure customer data, protect IP, and meet compliance requirements (PCI DSS, HIPAA, GDPR). 

eBook

eBook: The Definitive Guide to MongoDB Encryption Key Management

This definitive guide covers the critical issues involved in getting encryption right with MongoDB Enterprise.

White Paper

White Paper: What Data Needs Encrypted in MongoDB?

Generally speaking, you should encrypt any information that alone, or when combined with other information, can identify a unique, individual person. This is called Personally Identifying Information, or PII. 

Podcast

Podcast: IBM i, Two Factor Authentication, and PCI DSS

Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements.

Podcast

Podcast: Big Data, Encryption, & MongoDB

Join Patrick Townsend as he talks about leveraging the WiredTiger storage engine, achieving a strong security posture with key management, and how to easily begin encrypting data in MongoDB Enterprise.

Webinar

Webinar: Simplified Encryption & Key Management for MongoDB

Since the release of MongoDB Enterprise 3.2 with KMIP support, Townsend Security has been helping MongoDB users meet compliance (PCI DSS, HIPAA, etc.) and security best practices with external key management. 

Case Study

Case Study: The Seed Company Case Study

Securing data in MongoDB Enterprise with Alliance Key Manager.

Solution Brief

Solution Brief: Alliance Key Manager for MongoDB Joint Solution Brief

MongoDB Enterprise simplifies data protection by providing native FIPS compliant encryption of data at rest. Coupled with Townsend Security’s flagship encryption key management solution, Alliance Key Manager, meeting compliance (PCI DSS, HIPAA, etc.) and security standards is even easier and more affordable for large as well as small organizations.

Pagination

  • First page « First
  • Previous page ‹ Previous
  • Page 1
  • Page 2
  • Page 3
  • Current page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Next page Next ›
  • Last page Last »

Connect +1.800.357.1019

  • youtube
  • facebook
  • twitter
  • linkedin

Footer menu

  • Encryption
    • Applications
    • Cloud
    • Databases
    • Languages
    • Platforms
    • Virtualization
    • Web
  • Key Management
    • Applications
    • Databases
    • Platforms
  • Partners
    • Become a Partner
    • Partner Center
    • Resellers
    • Technology Partners
  • Resources
    • Blog
    • Case Studies
    • Data Sheets
    • Podcasts
    • Solution Briefs
    • Webinars
    • White Papers
    • eBooks
    • Documentation
  • Company
    • About Us
    • Employment
    • Validations
    • Community Giving
    • Contact
    • Legal/Privacy
  • Compliance
    • PCI DSS
    • HIPAA/HITECH
    • EU General Data Privacy Regulation (GDPR)
    • FERPA
    • FISMA
    • State Privacy