The Entropy Problem: Random Data and Secure Cryptography
Some commonly used sources of “random” data depend on inputs that have the potential to inject weakness, into the process.
Some commonly used sources of “random” data depend on inputs that have the potential to inject weakness, into the process.
PKWARE suite delivered integrated discovery and protection services for UHC's PHI data within aggregate data lake platform.
PKWARE enabled several of the city’s IT departments to streamline processes for exchanging data while protecting sensitive information.
This agency needed an encryption solution that could support the encryption technology required under FIPS 140 and HSPD-12.
PKWARE allowed the education provider to meet its customer obligations and internal data protection goals on schedule.
A leading healthcare software company turned to PKWARE when it needs to implement strong, reliable data protection.
Information security mandates surrounding TISAX Compliance are complex and multi-faceted, requiring the efforts of multiple departments.
Each time an organization sends sensitive data outside its own network, data can be intercepted or stolen, or given to unauthorized parties.
The General Data Protection Regulation (GDPR) may have been created in the European Union (EU), but this consumer privacy law applies to any organization, anywhere in the world, that controls or processes the personal data of EU residents.
Migrating Enterprise Data to the Cloud adds a security dimension: safeguarding PII, PCI, HIPAA data from leaving on-premises.
An insurance company uses PKWARE’s transparent data encryption to secure customer data and its own internal files.
PK Encryption protects your business from financial and brand damage by ensuring that sensitive information is encrypted.
Despite the need for data discovery many organizations are struggling to implement discovery strategies that address today's challenges.
Compliance with privacy regulations such as California Consumer Protection Act (CCPA) are best met by following strategic, targeted operational processes (privacy operations) and technological processes (privacy engineering) in tandem. But there's still a lot to unpack in there.
The rapid expansion of data in Hadoop HDFS is creating a critical problem for data management and security.
PK Protect shields your business from financial and brand damage by ensuring that your sensitive information is identified and protected
Protect cardholder data with PCI Compliance. Follow PCI DSS for secure payment processing. Keep your business safe.
PK Classification categorizes data based on custom or predefined policies to ensure sensitive data security and privacy.