Posted on 11 February 2019 by
In today’s business world, the encryption of an organization’s sensitive data-at-rest must now be a fundamental component to any successful cyber security strategy. Whether the goal is compliance or securing data in the event of a possible breach or attack, encryption as well as access management, must be a part of an organization’s overall defense. With the increased number of encryption keys that an organization must managed, the Key Management Interoperability Protocol (KMIP), provides a technology solution for this common issue that organizations are currently faced with.
Posted on 13 November 2018 by
Discover why Kapalya recently selected SafeNet Virtual KeySecure k170v — Gemalto’s next-generation key management solution — to provide centralized key management and improved administration, while helping customers to meet compliance.
Posted on 16 January 2018 by
Learn about the benefits of EKM for storage which includes compliance and security best practices, key lifecycle management, flexible deployment options and more.
Posted on 19 December 2017 by
NESA has produced the UAE Information Assurance Standards (UAE IAS), made up of 188 security controls and standards which are grouped into four tiers.