Skip Navigation

Attendees of this webcast learned about next generation authentication methods that provide secure access to networks and applications from a variety of devices while ensuring compliance. We also discussed:

  • FISMA Compliance & Electronic Authentication Guidelines
  • HSPD-12 Compliance & PIV Derived Credentials for Remote Identity Populations

Download Now

Attendees of this webcast learned the best practices for Layer 2 network encryption, such as:

  • Protecting networks from fiber tapping threats and private VLAN vulnerabilities
  • Complying with mandates
  • Implementing flexible, future-proof designs
  • Ensuring performance and efficiency
  • Employing a cost effective solution

Download Now

Attendees of this webcast learned about best practices for high speed network encryption. During this time, we explored:

  • Benefits of layer 2 network encryption
  • Utilizing transmission security to protect data in motion
  • Protecting closed-circuit television and video surveillance transmissions
  • Securing point-to-point and point-to-multi point communications

Download Now

Attendees of this webcast learned about best practices for protecting high value data-at-rest, including:

  • Implementing dynamic encryption for data-at-rest protection
  • Centralizing key management to secure and manage encryption keys
  • Separating server administration responsibility from data access and key management

Download Now

Attendees of this webcast learned about best practices for protecting high value data-at-rest, including:

  • Implementing dynamic encryption for data-at-rest protection
  • Centralizing key management to secure and manage encryption keys
  • Separating server administration responsibility from data access and key management

Download Now

Attendees of this webcast learned more about the three-step process to effective data at rest protection. During this time we discussed:

  • How to identify your high value data assets and create a plan to protect them
  • Different encryption methods for structured and unstructured data
  • Importance of key management

Download Now

Attendees of this webcast learned why enterprise key management is a vital component of a robust data security architecture enabling you to:

  • Protect data against physical theft of disk drives
  • Meet compliance and/or audit mandates
  • Protect intellectual property in multi-tenant environments
  • Secure data located in disaster recovery sites
  • Refresh legacy key management solutions
  • Maintain high performance and availability of user files

Download Now

Attendees of this webcast learned how encryption provides a trusted storage security solution for:

  • Data isolation in multi-tenant environments
  • Privileged user risk mitigation
  • Compliance
  • Archived data and intellectual property protection

Download Now

Attendees of this webcast learned why securing encryption keys in a dedicated hardware key manager better protects your data. During this time, we discussed:

  • Vulnerabilities of storing keys on a server
  • Benefits of external hardware key management
  • Importance of separating administrative duties

Download Now

Attendees of this webcast learned more about the:

  • Administrative burden required to manage fragmented key stores and associated lifecycle operations
  • Inability to provide a consistent policy across multiple encryption solutions
  • Importance of enhanced key protection (FIPS 140-2 Level 3) and governance across key lifecycles

Download Now

Attendees of this webcast learned how you can employ a hardware-based digital signature solution to ensure the validity of critical documents with an easy-to-deploy, high-assurance solution using Adobe® LiveCycle® and SafeNet's Luna SA Hardware Security Module, including how to:

  • Guarantee signer authenticity and data integrity
  • Streamline business processes
  • Reduce costs associated with traditional paper-based processes
  • Ensure legal compliance

Download Now

Attendees of this learned how to easily deploy a cost-effective DNSSEC solution that does not increase the burden on DNS administrators and:

  • Boosts security
  • Reduces costs
  • Controls access
  • Maintains application integrity
  • Scales to accommodate high volume processing

Download Now

Attendees of this webcast learned how to protect cryptographic keys by easily integrating hardware security modules to applications in order to secure:

  • PKI/Certificate Services
  • Database and File Encryption
  • Web Services
  • Cloud Services

Download Now

Attendees of this F5 | SafeNet webcast learned how to secure and optimize the delivery of enterprise applications, including how F5's BIG-IP System integrated with SafeNet's Luna SA HSM can:

  • Deliver high performance processing
  • Provide robust security
  • Meet compliance standards
  • Secure the transport layer while improving data center performance

Download Now

During this session, we discussed the best practices for protecting cryptographic keys. Attendees learned how to::

  • Meet compliance mandates such as HIPAA, FISMA, FedRAMP
  • Safely store sensitive data in the cloud
  • Mitigate the insider threat
  • Protect intellectual property in multi-tenant environments

Download Now

Core data center functionality is moving to the field as part of battlefield multi-domain transformation. It is becoming commonplace for command posts, mobile command centers, and even mobile platforms: vehicles, ships, and planes to contain micro data centers that provide new capabilities and services at the cyber-edge to the warfighter. What still needs to be addressed is how to effectively transition existing core cyber security controls so that data is protected in the field when faced with conditions such as:

  • Harsh environments
  • Bandwidth-limited and disconnected environment
  • Supply Chain Security
  • Overrun or hostile scenarios
  • SWaP Constraints

This session will discuss how core cyber security controls can be transitioned to the tactical field in order to safely provide highly sensitive data for command and warfighters at the cyber-edge.

Download Now

Robust, web-based enterprise grade network management for high speed encryptors that streamlines management of  Network Encryptors

Download Now

10Mbps-1Gbps Versatile and Compact, Entry-level Ethernet Encryptor

Download Now

10Mbps-1Gbps Versatile and Compact, Entry-level Ethernet Encryptor

Download Now

100Gbps High-Assurance Mega Data Encryptor

Download Now

1Gbps-10Gbps Scalable, High Assurance Ethernet Encryptor

Download Now

100Gbps High-Assurance Mega Data Encryptor

Download Now

Hardened Virtual Encryptor  for Extended WANs and SD-WANs

Download Now

Compact, cost effective cryptographic key management platform for small to medium sized deployments commonly found in small offices, remote sites, and tactical environments

Download Now

Enterprise-level virtual key management platform that protects cryptographic keys

Download Now

Enterprise-level centralized key management platform that manages cryptographic keys, certificates and applications

Download Now

USB-attached HSM that is ideal for storing root cryptographic keys in an offline key storage device.

Download Now

Embedded HSM that protects cryptographic keys and accelerates sensitive cryptographic operations.

Download Now

Network-attached HSM that protects encryption keys used by applications in on-premise, virtual, and cloud environments.

Download Now

Middleware Enabling Certificate-based Solutions for Remote Access and Advanced Security Applications

Download Now

The sKey3250, a certificate-based USB authenticator, provides multi-factor access to sensitive networks and workstations through a single device

sKey3250 Product Brief

Smart Card 650 (SC650), a certificate-based smart card, enables strong two-factor authentication and proof-positive user identification in all PKI environments.

Download Now

Learn how to integrate HyTrust KeyControl with SafeNet AT Luna SA HSM for Government.

 

Learn how to integrate HyTrust KeyControl with SafeNet AT Luna SA HSM for Government.

 

 

Learn how to integrate F5 Big-IP with SafeNet AT Luna SA HSM for Government.

 

Learn how to integrate KeySecure for Government with a Rubrik cluster.

 

Learn how to integrate Thales TCT’s KeySecure for Government with VMware vSphere.

 

Learn how to integrate Thales TCT’s Luna SA HSM for Government with ISC CertAgent.

 

Learn how to integrate Thales TCTs Luna SA HSM for Government with Axway VA validation authority.

 

Learn how to configure a Luna Client to work with a Luna SA HSM for Government appliance.

 

Learn how to integrate HPE iLO with KeySecure for Government in this video. It provides a quick walk through of the KeySecure for Government and HPE iLO integration. The elements that need to be configured on KeySecure outlined, and how to configure remote key managers on iLO is shown. The video concludes when iLO and KeySecure are successfully communicating.

 

Learn how to integrate SafeNet AT's Luna SA for Government HSM with PrimeKey's CA, EJBCA.

 

Learn how how to use the HSM to create a column master key used to encrypt column encryption keys used by SQL. This will ensure that information entered by the client side is encrypted before it's sent to the SQL database on the SQL server. This means that the client will be able to see decrypted information but on SQLserver, the database adminstrator and anyone who has assess to that server will only see encrypted information.

 

Learn how how to integrate Microsoft Active Directory Certificate Services with Thales TCT's Luna SA for Government HSM.

 

Learn how to integrate Venafi Trust Protection Platform with  Luna SA for Government HSM.

 

Learn how to integrate a Cohesit cluster with  KeySecure for Government. KeySecure for Government generates and securely stores the Key Encrypting Keys (KEKs) used to encrypt each storage domain in the cluster.

 

Learn how to integrate Microsoft Azure Bring Your Own Key with  Luna SA for Government HSM. Using this feature, users will be able to generate their own key, store and mange their key themselves, and import it to Azure for use in other services.

 

Learn how to integrate Microsoft ISS with Luna SA HSM for Government.

 

Learn how to manage AWS CMKs with KeySecure for Government.

 

Learn how to integrate AppViewX with Luna SA HSM for Government.

 

Cipher Summit 2019 Replay

Check out the on demand videos and presentations from the event. Download Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept