Skip to main content

Download eBook: The Definitive Guide to VMware Encryption & Key Management

X
Home

Search

  • Contact us
  • Blog
  • Documentation
  •  

Main navigation

  • Products
    • Enterprise Key Management Server (KMS)
      • Hardware Security Module (HSM)
      • VMware
      • Microsoft Azure
      • Amazon Web Services (AWS)
      • VMware Cloud on AWS
      • IBM Cloud for VMware
    • Database & Storage Encryption Key Management
      • SQL Server
      • MongoDB
      • vSphere and vSAN
      • NetLib Encryptionizer
      • Drupal
      • Edge Computing
      • MySQL
    • IBM i Security Solutions
      • Syncsort has acquired Townsend Security's IBM i security solutions.
  • Solutions
  • Resources
  • Developers
  • Partners
  • Support
  • GET STARTED
Home
  • Products
    • Enterprise Key Management Server (KMS)
      • Hardware Security Module (HSM)
      • VMware
      • Microsoft Azure
      • Amazon Web Services (AWS)
      • VMware Cloud on AWS
      • IBM Cloud for VMware
    • Database & Storage Encryption Key Management
      • SQL Server
      • MongoDB
      • vSphere and vSAN
      • NetLib Encryptionizer
      • Drupal
      • Edge Computing
      • MySQL
    • IBM i Security Solutions
      • Syncsort has acquired Townsend Security's IBM i security solutions.
  • Solutions
  • Resources
  • Developers
  • Partners
  • Support

Resources

Looking for specific information? Use our search below to find what you're looking for.

Solution Brief

Solution Brief: Alliance Token Manager

Enterprise customers can greatly reduce or eliminate their compliance exposure by using tokenization – the replacement of sensitive data with a token that has similar characteristics, but no value.

Data Sheet

Datasheet: Alliance Token Manager

Alliance Token Manager allows enterprise customers and payment system vendors to reduce the risks associated with data loss and meet compliance regulations.

White Paper

White Paper: The Business Case for Tokenization

By tokenizing data, organizations can reduce the chance of losing sensitive information – credit card numbers, social security numbers, banking information, and other types of PII.

Webinar

Webinar: Tokenization & Compliance: 5 Ways to Reduce Costs & Increase Security

Learn five practical ways to reduce the financial impact of complying with: PCI, HIPAA, SOX, and State privacy laws.

Data Sheet

Datasheet: Alliance Two Factor Authentication

Reduce the security weakness of relying on passwords or passphrases as the primary and only authentication mechanism.

Solution Brief

Solution Brief: Alliance Two Factor Authentication

Reduce the security weakness of relying on passwords or passphrases as the primary and only authentication mechanism.

Webinar

Webinar: Two Factor Authentication on IBM i

Factor Authentication (2FA) is helping organizations improve the security of their core business applications.  By using SMS text or voice validation, rather than a security token, businesses can easily enhance their security in a cost-effective way.

Podcast

Podcast: Two Factor Authentication on IBM i

Learn about: Why the IBM i isn't as secure as you think, the different methods for two factor authentication, and how by using SMS or voice validation businesses can easily enhance their security in a cost-effective way.

White Paper

White Paper: Two Factor Authentication on IBM i

Download this white paper to learn: Why the IBM i may not be as secure as you think, the need for verification on the IBM i, and how to meet compliance requirements (PCI DSS, FFIEC, etc.)

White Paper

White Paper: Transport Layer Security (TLS) & Encryption: Complementary Security Tools

Transport Layer Security (TLS) and content encryption can both be used to secure email communications.

Pagination

  • First page « First
  • Previous page ‹ Previous
  • …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Current page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • …
  • Next page Next ›
  • Last page Last »

Connect +1.800.357.1019

  • youtube
  • facebook
  • twitter
  • linkedin

Footer menu

  • Encryption
    • Applications
    • Cloud
    • Databases
    • Languages
    • Platforms
    • Virtualization
    • Web
  • Key Managment
    • Applications
    • Databases
    • Platforms
  • Partners
    • Become a Partner
    • Partner Center
    • Resellers
    • Technology Partners
  • Resources
    • Blog
    • Case Studies
    • Data Sheets
    • Podcasts
    • Solution Briefs
    • Webinars
    • White Papers
    • eBooks
    • Documentation
  • Company
    • About Us
    • Employment
    • Validations
    • Community Giving
    • Contact
    • Legal/Privacy
  • Compliance
    • PCI DSS
    • HIPAA/HITECH
    • EU General Data Privacy Regulation (GDPR)
    • FERPA
    • FISMA
    • State Privacy