SafeNet

Displaying 1-33 of 33 results

  • White Papers // Jun 2014

    Leveraging Encryption to Secure Data in Storage: Current Market Deployments and Trends

    To better safeguard their sensitive data, organizations are increasingly looking to leverage encryption. To provide a current look at storage encryption deployments in organizations today, SafeNet undertook an extensive survey of IT executives in North America and EMEA; details found how pervasive encryption of assets in storage has become, as...

    Provided By SafeNet

  • White Papers // Jun 2014

    Sleeping through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed

    Computing and delivery models, user platforms and devices, and security threats have changed radically in recent years - security professionals are living in a time of rapid and fundamental change. However, in many ways, the security technologies and approaches employed by many organizations have remained relatively static, sometimes leading to...

    Provided By SafeNet

  • White Papers // Jun 2014

    Encryption, Key Management, and Consolidation in Today’s Data Center

    In the midst of an ever-changing, ever-more dangerous threat landscape, insiders continue to inflict damage, and in virtualized and cloud environments, more privileged users can gain access sensitive data. In addition, external attacks and attackers are increasingly sophisticated in this evolving environment; data protection strategies become increasingly critical, and ever...

    Provided By SafeNet

  • White Papers // Jun 2014

    Data Center Encryption Survey

    Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals...

    Provided By SafeNet

  • White Papers // Feb 2014

    Data Center Encryption Survey - Securing the Path to Consolidation in Today's Data Center

    Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals...

    Provided By SafeNet

  • White Papers // Feb 2014

    Encryption, Key Management, and Consolidation in Today’s Data Center

    Today, organizations’ leadership teams are striving to meet their competitive demands for agility and innovation, while wringing the most value from their IT expenditures. Consequently, these executives continue to pursue data center consolidation by reducing the number of physical data center sites, expanding the use of virtualization, and adopting cloud...

    Provided By SafeNet

  • White Papers // Feb 2014

    Next Generation Authentication - Keys to Balancing Security and Convenience

    The demands for heightened security through the use of multi-factor authentication are pressing, but so is the need to control budgets and give users convenient access to the data and services they need. It is growing increasingly clear that organizations can’t meet these demands with legacy platforms—they need next-generation authentication....

    Provided By SafeNet

  • White Papers // Feb 2014

    Multi-factor Authentication- Current Usage and Trends

    In this digital age, validating identities and controlling access is vital, which is why multifactor authentication has become such a fundamental requirement in so many organisations. This white paper draws on a large survey to provide a current picture of the authentication landscape in Europe, the Middle East, and Africa...

    Provided By SafeNet

  • White Papers // Dec 2012

    Assessing the True Cost of Strong Authentication - TCO Whitepaper

    Authentication Can Be Complex We know how important the right authentication solution is to help secure your cloud environment. Traditional authentication solutions, however, can be costly to configure, manage and control. Now, in the back of your mind, you're wondering if you are truly securing the assets most at risk....

    Provided By SafeNet

  • White Papers // Oct 2012

    Encryption in NAS Environments: Requirements and Keys to Success

    The very attributes that make network-attached storage environments invaluable to enterprises, from their accessibility to centralization of assets and flexibility, also make them valuable targets to malicious insiders and external criminals, and susceptible to accidental exposure. This paper details why encryption is vital in NAS environments that house sensitive...

    Provided By SafeNet

  • White Papers // Apr 2010

    Cloud Computing and the Federal Government: Maximizing Trust

    Cloud computing services can support nearly every mission the federal government performs - from defending the nation's borders to protecting the environment. Offering an elastic, adaptive infrastructure, cloud computing enables federal agencies and their component organizations to share information and create services, improving how agencies support the federal mission and...

    Provided By SafeNet

  • Case Studies // Dec 2009

    SafeNet Case Study: Vernon Building Society

    Vernon Building Society was founded in 1924 in Stockport, Cheshire. The Vernon Building Society is an independent, mutual building society. They aim to provide competitive mortgages, savings and investment products. Vernon Building Society wanted to enhance the protection of their customer's highly sensitive data by investing in a hard disk...

    Provided By SafeNet

  • Case Studies // Nov 2009

    SafeNet Security Hardware and Consulting Services for the Registered Traveler System

    Security Biometric Clearing Network (SBCN) needed to secure their Root Certification Authority and Central Information Management System for the Transportation Security Administration's (TSA) Registered Traveler program. The program allows for certain government-identified low-risk passengers to voluntarily have their identities checked using biometric technology and the government threat database. In order...

    Provided By SafeNet

  • Case Studies // Nov 2009

    Egg Expedites PIN Issuance With SafeNet Solution

    Egg, the UK's leading online bank and a member of Citi, became the U.K.'s first Internet-only bank in 1998. Personal Identification Numbers (PINs) are increasingly used to authenticate customers and authorize credit card transactions, such as ATM withdrawals or retail purchases. SafeNet's award-winning PIN management platform ViewPIN+ perfectly suited the...

    Provided By SafeNet

  • Case Studies // Nov 2009

    SafeNet Case Study: Electronics Manufacturing

    Recently, a leading electronics manufacturing customer changed its security policies to include secure identification and authentication for its devices. Rigorous security controls used to issue digital identities and authenticate individuals needed to be translated to the manufacturing process that issues digital credentials to electronic devices. In this example the devices...

    Provided By SafeNet

  • Case Studies // Nov 2009

    SafeNet Case Study: Canadian Government Secure Channel

    The Canadian government created an online network known as the "Secure Channel" that enabled Canadian citizens to perform a wide variety of online transactions with the government - from paying taxes to applying for benefits for starting businesses - with assurances that all transactions will remain private and secure. SafeNet's...

    Provided By SafeNet

  • Case Studies // Nov 2009

    SafeNet Hardware Security Modules Selected to Protect the State of Qatar's Financial Communications and Transactions

    The Qatar Central Bank, is one of the most advanced central banks in the Gulf Cooperation Council (GCC) countries and is the regulatory authority for banks, exchange houses, investment companies, and financial companies within the state of Qatar. Qatar Central Bank was looking for a solution for securing financial transactions,...

    Provided By SafeNet

  • Case Studies // Nov 2009

    Large U.S. Financial Services Company Chooses SafeEnterprise Link and SONET Encryptors

    Fifth Third Bancorp is a diversified financial services company that provides banking, investment, and electronic payment processing services to 5.7 million customers through 17 affiliates. The challenge was to decease in network performance and to find a high performance encryption solution that is easy to deploy. Fifth Third Bancorp deployed...

    Provided By SafeNet

  • Case Studies // Nov 2009

    Antwerp Port Authority Selects SafeNet

    Antwerp Port Authority manages the 4th largest port in the world, including docks, berths, locks, and bridges. The challenge was establish and maintain a secure, trusted e-Invoicing solution, to protect electronic invoices from being altered in transit, etc. Antwerp Port deployed electronic invoice solution based on digital signatures that ensures...

    Provided By SafeNet

  • Case Studies // Aug 2009

    Netgiro Selects SafeNet for PCI Compliance

    Netgiro is a leading, full service payment solution provider for e-merchants around the world - connecting businesses to local payment methodologies. The challenge was to comply with PCI requirements, to displace existing in-house, software-based solution for the protection of IBM DB2 system and scalable solution that would allow them to...

    Provided By SafeNet

  • Case Studies // Jul 2009

    SafeNet Enterprise Data Protection Delivers Protection, Trust, and Confidence for the Prepaid Credit Card and Payment Processing Market

    Tutuka, a payment processor in South Africa, provides software solutions for gift vouchers, gift cards, prepaid cash replacement, and loyalty programs. Tutuka needed to encrypt the credit card data residing in their Microsoft SQL database in order to comply with PCI DSS. Tutuka selected SafeNet DataSecure i116 platform for their...

    Provided By SafeNet

  • Case Studies // Jul 2009

    SpecView Protects Software With Sentinel Hardware Keys

    SpecView is the leading European developer of Supervisory Control and Data Acquisition (SCADA) software. The company creates applications that are used for operator interfaces (HMI's), data acquisition, and report generation. The challenge was to copy protection for valuable software application and addition of software-based licenses to meet evolving customer needs....

    Provided By SafeNet

  • Case Studies // Jun 2009

    Fusion Electronics Selects SafeNet Hardware Keys, Implements Usagebased Pricing

    Fusion Electronics develops products for the automation of the dairy industry. The product range consists of herd management software and automated milking and feeding, as well sensor technologies for cows, goats, sheep, and camels. Fusion Electronics required software protection and licensing for their herd management software, Crystal, as well as...

    Provided By SafeNet

  • Case Studies // Jun 2009

    Geocap Replaces FLEXlm With SafeNet Sentinel RMS

    Founded in 1998, Geocap AS has more than a decade of experience in providing software and services for the oil and gas industry as well as international maritime institutions. Geocap required a licensing solution for the Geocap application in order to control their licensing terms and conditions. Geocap sought an...

    Provided By SafeNet

  • Case Studies // May 2009

    Thermo-Calc Switches From FLEXlm to Sentinel RMS for Their Licensing Needs

    Sweden-based Thermo-Calc Software is a leading developer of software and databases, in the area of computational thermodynamics, as well as simulation of diffusion controlled phase-transformations. The challenge was difficulty in predicting licensing expenses with existing Acresso solution and need to minimize charges for cross platform support. Thermo-Calc Software deployed SafeNet...

    Provided By SafeNet

  • Case Studies // Apr 2009

    Vero Simplifies Distribution, Reduces Costs With Sentinel RMS

    Vero UK Ltd., a fully owned subsidiary of Vero Software Plc, develops and distributes CAD / CAM / CAE software for aiding the design and manufacturing process in sectors of industry with a knowledge driven focus on Mould & Die. The challenge was to simplify software license distribution, to manage...

    Provided By SafeNet

  • Case Studies // Mar 2009

    VSTEP Implements Sentinel Hardware Keys to Protect Software

    VSTEP is the leading European developer of simulators and virtual training software. Using interactive 3D technology from the computer gaming industry, the company creates training applications and games that allow people to build their skills in a practical and cost effective way. The challenge was to securely protect high value...

    Provided By SafeNet

  • Case Studies // Jan 2009

    B&H Photo Selects SafeNet for PCI Compliance

    For more than 30 years, New York-based B&H Photo has been a world leader in the photo, video and digital imaging retail industry, grossing more than $100 million in annual sales revenue. The challenge was to comply with PCI requirements, to implement a single integrated and comprehensive solution capable of...

    Provided By SafeNet

  • White Papers // Dec 2008

    Protecting Sensitive Data on Ethernet WAN: How to Reduce Cost and Complexity of Network Security

    Universal connectivity is essential in today's complex business environments. Driven by the convergence of data, voice, and video over sophisticated and expanding networks, growth in demand for bandwidth is outpacing Moore's Law to supply sufficient throughput. To meet this increasing demand, organizations are looking not only for larger network pipes...

    Provided By SafeNet

  • Case Studies // Oct 2008

    Antwerp Port Authority: Secure Electronic Invoicing Solution

    Antwerp Port Authority manages the 4th largest port in the world, including docks, berths, locks, and bridges. The challenge was to establish and maintain a secure and trusted e-Invoicing solution, to protect electronic invoices from being altered in transit, etc. Antwerp deployed electronic invoice solution based on digital signatures that...

    Provided By SafeNet

  • Case Studies // Oct 2008

    Siteco Implements Sentinel Hardware Keys Over Aladdin HASP

    Siteco Lighting Control is a subsidiary of the company Siteco Beleuchtungstechnik (Lighting Technology), formerly Siemens Beleuchtungstechnik. The challenge was to protect software revenue, to offer demo licenses and to securely send remote updates. Siteco Lighting Control deployed SafeNet Sentinel Hardware Keys. In searching for a software licensing and protection system,...

    Provided By SafeNet

  • Case Studies // Oct 2008

    How SafeNet Products Help Companies Meet PCIDSS Requirements

    With the rising incidence of threats to consumer data, and increasing requirements to protect that data, merchants must focus on their security infrastructure. Regulations have been implemented not only by the state and federal governments, but by the credit card industry as well. Companies are compelled to prove their compliance...

    Provided By SafeNet

  • Case Studies // Sep 2008

    Contal OK Secures Software With SafeNet Sentinel Hardware Keys

    Contal OK is a developer and producer of security systems. The company provides burglary alarms and systems for access control, integrated security, time attendance, and paging. The company sought a software protection solution that also offered a means to manage and control their distribution chain. As a part of their...

    Provided By SafeNet

  • White Papers // Oct 2012

    Encryption in NAS Environments: Requirements and Keys to Success

    The very attributes that make network-attached storage environments invaluable to enterprises, from their accessibility to centralization of assets and flexibility, also make them valuable targets to malicious insiders and external criminals, and susceptible to accidental exposure. This paper details why encryption is vital in NAS environments that house sensitive...

    Provided By SafeNet

  • White Papers // Dec 2012

    Assessing the True Cost of Strong Authentication - TCO Whitepaper

    Authentication Can Be Complex We know how important the right authentication solution is to help secure your cloud environment. Traditional authentication solutions, however, can be costly to configure, manage and control. Now, in the back of your mind, you're wondering if you are truly securing the assets most at risk....

    Provided By SafeNet

  • White Papers // Feb 2014

    Next Generation Authentication - Keys to Balancing Security and Convenience

    The demands for heightened security through the use of multi-factor authentication are pressing, but so is the need to control budgets and give users convenient access to the data and services they need. It is growing increasingly clear that organizations can’t meet these demands with legacy platforms—they need next-generation authentication....

    Provided By SafeNet

  • White Papers // Feb 2014

    Multi-factor Authentication- Current Usage and Trends

    In this digital age, validating identities and controlling access is vital, which is why multifactor authentication has become such a fundamental requirement in so many organisations. This white paper draws on a large survey to provide a current picture of the authentication landscape in Europe, the Middle East, and Africa...

    Provided By SafeNet

  • White Papers // Feb 2014

    Data Center Encryption Survey - Securing the Path to Consolidation in Today's Data Center

    Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals...

    Provided By SafeNet

  • White Papers // Feb 2014

    Encryption, Key Management, and Consolidation in Today’s Data Center

    Today, organizations’ leadership teams are striving to meet their competitive demands for agility and innovation, while wringing the most value from their IT expenditures. Consequently, these executives continue to pursue data center consolidation by reducing the number of physical data center sites, expanding the use of virtualization, and adopting cloud...

    Provided By SafeNet

  • White Papers // Dec 2008

    Protecting Sensitive Data on Ethernet WAN: How to Reduce Cost and Complexity of Network Security

    Universal connectivity is essential in today's complex business environments. Driven by the convergence of data, voice, and video over sophisticated and expanding networks, growth in demand for bandwidth is outpacing Moore's Law to supply sufficient throughput. To meet this increasing demand, organizations are looking not only for larger network pipes...

    Provided By SafeNet

  • Case Studies // Nov 2009

    Antwerp Port Authority Selects SafeNet

    Antwerp Port Authority manages the 4th largest port in the world, including docks, berths, locks, and bridges. The challenge was establish and maintain a secure, trusted e-Invoicing solution, to protect electronic invoices from being altered in transit, etc. Antwerp Port deployed electronic invoice solution based on digital signatures that ensures...

    Provided By SafeNet

  • Case Studies // Aug 2009

    Netgiro Selects SafeNet for PCI Compliance

    Netgiro is a leading, full service payment solution provider for e-merchants around the world - connecting businesses to local payment methodologies. The challenge was to comply with PCI requirements, to displace existing in-house, software-based solution for the protection of IBM DB2 system and scalable solution that would allow them to...

    Provided By SafeNet

  • Case Studies // Jul 2009

    SafeNet Enterprise Data Protection Delivers Protection, Trust, and Confidence for the Prepaid Credit Card and Payment Processing Market

    Tutuka, a payment processor in South Africa, provides software solutions for gift vouchers, gift cards, prepaid cash replacement, and loyalty programs. Tutuka needed to encrypt the credit card data residing in their Microsoft SQL database in order to comply with PCI DSS. Tutuka selected SafeNet DataSecure i116 platform for their...

    Provided By SafeNet

  • Case Studies // Nov 2009

    SafeNet Security Hardware and Consulting Services for the Registered Traveler System

    Security Biometric Clearing Network (SBCN) needed to secure their Root Certification Authority and Central Information Management System for the Transportation Security Administration's (TSA) Registered Traveler program. The program allows for certain government-identified low-risk passengers to voluntarily have their identities checked using biometric technology and the government threat database. In order...

    Provided By SafeNet

  • Case Studies // Nov 2009

    Egg Expedites PIN Issuance With SafeNet Solution

    Egg, the UK's leading online bank and a member of Citi, became the U.K.'s first Internet-only bank in 1998. Personal Identification Numbers (PINs) are increasingly used to authenticate customers and authorize credit card transactions, such as ATM withdrawals or retail purchases. SafeNet's award-winning PIN management platform ViewPIN+ perfectly suited the...

    Provided By SafeNet

  • Case Studies // Nov 2009

    SafeNet Case Study: Electronics Manufacturing

    Recently, a leading electronics manufacturing customer changed its security policies to include secure identification and authentication for its devices. Rigorous security controls used to issue digital identities and authenticate individuals needed to be translated to the manufacturing process that issues digital credentials to electronic devices. In this example the devices...

    Provided By SafeNet

  • Case Studies // Nov 2009

    SafeNet Case Study: Canadian Government Secure Channel

    The Canadian government created an online network known as the "Secure Channel" that enabled Canadian citizens to perform a wide variety of online transactions with the government - from paying taxes to applying for benefits for starting businesses - with assurances that all transactions will remain private and secure. SafeNet's...

    Provided By SafeNet

  • Case Studies // Jan 2009

    B&H Photo Selects SafeNet for PCI Compliance

    For more than 30 years, New York-based B&H Photo has been a world leader in the photo, video and digital imaging retail industry, grossing more than $100 million in annual sales revenue. The challenge was to comply with PCI requirements, to implement a single integrated and comprehensive solution capable of...

    Provided By SafeNet

  • Case Studies // Nov 2009

    SafeNet Hardware Security Modules Selected to Protect the State of Qatar's Financial Communications and Transactions

    The Qatar Central Bank, is one of the most advanced central banks in the Gulf Cooperation Council (GCC) countries and is the regulatory authority for banks, exchange houses, investment companies, and financial companies within the state of Qatar. Qatar Central Bank was looking for a solution for securing financial transactions,...

    Provided By SafeNet

  • Case Studies // Oct 2008

    How SafeNet Products Help Companies Meet PCIDSS Requirements

    With the rising incidence of threats to consumer data, and increasing requirements to protect that data, merchants must focus on their security infrastructure. Regulations have been implemented not only by the state and federal governments, but by the credit card industry as well. Companies are compelled to prove their compliance...

    Provided By SafeNet

  • Case Studies // Sep 2008

    Contal OK Secures Software With SafeNet Sentinel Hardware Keys

    Contal OK is a developer and producer of security systems. The company provides burglary alarms and systems for access control, integrated security, time attendance, and paging. The company sought a software protection solution that also offered a means to manage and control their distribution chain. As a part of their...

    Provided By SafeNet

  • White Papers // Apr 2010

    Cloud Computing and the Federal Government: Maximizing Trust

    Cloud computing services can support nearly every mission the federal government performs - from defending the nation's borders to protecting the environment. Offering an elastic, adaptive infrastructure, cloud computing enables federal agencies and their component organizations to share information and create services, improving how agencies support the federal mission and...

    Provided By SafeNet

  • White Papers // Jun 2014

    Encryption, Key Management, and Consolidation in Today’s Data Center

    In the midst of an ever-changing, ever-more dangerous threat landscape, insiders continue to inflict damage, and in virtualized and cloud environments, more privileged users can gain access sensitive data. In addition, external attacks and attackers are increasingly sophisticated in this evolving environment; data protection strategies become increasingly critical, and ever...

    Provided By SafeNet

  • White Papers // Jun 2014

    Data Center Encryption Survey

    Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals...

    Provided By SafeNet

  • White Papers // Jun 2014

    Leveraging Encryption to Secure Data in Storage: Current Market Deployments and Trends

    To better safeguard their sensitive data, organizations are increasingly looking to leverage encryption. To provide a current look at storage encryption deployments in organizations today, SafeNet undertook an extensive survey of IT executives in North America and EMEA; details found how pervasive encryption of assets in storage has become, as...

    Provided By SafeNet

  • White Papers // Jun 2014

    Sleeping through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed

    Computing and delivery models, user platforms and devices, and security threats have changed radically in recent years - security professionals are living in a time of rapid and fundamental change. However, in many ways, the security technologies and approaches employed by many organizations have remained relatively static, sometimes leading to...

    Provided By SafeNet

  • Case Studies // Oct 2008

    Siteco Implements Sentinel Hardware Keys Over Aladdin HASP

    Siteco Lighting Control is a subsidiary of the company Siteco Beleuchtungstechnik (Lighting Technology), formerly Siemens Beleuchtungstechnik. The challenge was to protect software revenue, to offer demo licenses and to securely send remote updates. Siteco Lighting Control deployed SafeNet Sentinel Hardware Keys. In searching for a software licensing and protection system,...

    Provided By SafeNet

  • Case Studies // Jun 2009

    Geocap Replaces FLEXlm With SafeNet Sentinel RMS

    Founded in 1998, Geocap AS has more than a decade of experience in providing software and services for the oil and gas industry as well as international maritime institutions. Geocap required a licensing solution for the Geocap application in order to control their licensing terms and conditions. Geocap sought an...

    Provided By SafeNet

  • Case Studies // Jun 2009

    Fusion Electronics Selects SafeNet Hardware Keys, Implements Usagebased Pricing

    Fusion Electronics develops products for the automation of the dairy industry. The product range consists of herd management software and automated milking and feeding, as well sensor technologies for cows, goats, sheep, and camels. Fusion Electronics required software protection and licensing for their herd management software, Crystal, as well as...

    Provided By SafeNet

  • Case Studies // Jul 2009

    SpecView Protects Software With Sentinel Hardware Keys

    SpecView is the leading European developer of Supervisory Control and Data Acquisition (SCADA) software. The company creates applications that are used for operator interfaces (HMI's), data acquisition, and report generation. The challenge was to copy protection for valuable software application and addition of software-based licenses to meet evolving customer needs....

    Provided By SafeNet

  • Case Studies // Oct 2008

    Antwerp Port Authority: Secure Electronic Invoicing Solution

    Antwerp Port Authority manages the 4th largest port in the world, including docks, berths, locks, and bridges. The challenge was to establish and maintain a secure and trusted e-Invoicing solution, to protect electronic invoices from being altered in transit, etc. Antwerp deployed electronic invoice solution based on digital signatures that...

    Provided By SafeNet

  • Case Studies // Mar 2009

    VSTEP Implements Sentinel Hardware Keys to Protect Software

    VSTEP is the leading European developer of simulators and virtual training software. Using interactive 3D technology from the computer gaming industry, the company creates training applications and games that allow people to build their skills in a practical and cost effective way. The challenge was to securely protect high value...

    Provided By SafeNet

  • Case Studies // Apr 2009

    Vero Simplifies Distribution, Reduces Costs With Sentinel RMS

    Vero UK Ltd., a fully owned subsidiary of Vero Software Plc, develops and distributes CAD / CAM / CAE software for aiding the design and manufacturing process in sectors of industry with a knowledge driven focus on Mould & Die. The challenge was to simplify software license distribution, to manage...

    Provided By SafeNet

  • Case Studies // May 2009

    Thermo-Calc Switches From FLEXlm to Sentinel RMS for Their Licensing Needs

    Sweden-based Thermo-Calc Software is a leading developer of software and databases, in the area of computational thermodynamics, as well as simulation of diffusion controlled phase-transformations. The challenge was difficulty in predicting licensing expenses with existing Acresso solution and need to minimize charges for cross platform support. Thermo-Calc Software deployed SafeNet...

    Provided By SafeNet

  • Case Studies // Nov 2009

    Large U.S. Financial Services Company Chooses SafeEnterprise Link and SONET Encryptors

    Fifth Third Bancorp is a diversified financial services company that provides banking, investment, and electronic payment processing services to 5.7 million customers through 17 affiliates. The challenge was to decease in network performance and to find a high performance encryption solution that is easy to deploy. Fifth Third Bancorp deployed...

    Provided By SafeNet

  • Case Studies // Dec 2009

    SafeNet Case Study: Vernon Building Society

    Vernon Building Society was founded in 1924 in Stockport, Cheshire. The Vernon Building Society is an independent, mutual building society. They aim to provide competitive mortgages, savings and investment products. Vernon Building Society wanted to enhance the protection of their customer's highly sensitive data by investing in a hard disk...

    Provided By SafeNet