As cloud infrastructure and compliance regulations become more complicated, companies are looking to simplify data security by adopting more pervasive encryption of sensitive data and consolidating ...
Catalogic Software, a provider of secure data protection solutions, announced the release for Catalogic DPX 4.15, the latest version of its all-in-one enterprise backup and recovery solution.
With the HyTrust acquisition, customers can turn to Entrust for identity, encryption and security policy control, providing data protection and compliance for enterprises accelerating their digital ...
Most encryption key management vendors try to specialize on one aspect of encryption, such as whole drive, e-mail or file based protection. That’s why we tested each vendor for this review based first ...
CipherTrust Cloud Key Manager helps organizations meet compliance requirements and support data governance across hybrid and multi-cloud environments Latest Bring Your Own Key integrations include ...
MINNEAPOLIS--(BUSINESS WIRE)--Entrust a global leader in trusted identity, payments and data protection, today announced that it has acquired HyTrust, Inc. an innovative provider of virtualized and ...
Fortanix Inc., a leader in data security and pioneer of Confidential Computing, is announcing the availability of Key Insight for the Fortanix Data Security Management (DSM) platform, a capability ...
Companies have a problem with encryption: While many businesses duly encrypt sensitive data, there is no standard strategy for deploying and managing a key-management infrastructure. Every ...
Is your enterprise looking at increasing its use of data encryption? Check out these best practices before setting your enterprise strategy. In last week’s article, I covered four basic best practices ...
BRISTOL, England--(BUSINESS WIRE)--StorMagic®, simplifying storage and security from the edge to the core, today announced that Giant Eagle, Inc. a U.S. food, fuel and pharmacy retailer with more than ...
Why? More and more data is being encrypted each day so key management is becoming increasingly important. Stolen encryption keys could compromise the confidentiality of sensitive data while lost ...