Product Resources
Learn more about PKWARE’s industry-leading encryption and data discovery solutions.
PKWARE redefines enterprise data protection, providing complete administrative control while finding and protecting sensitive data on user devices, file servers, mainframes, and more, on every enterprise operating system.
Read PDFPKWARE Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers, ensuring compliance with a wide range of regulatory requirements and customer privacy mandates. TDE secures file and application data without application changes, additional infrastructure or professional services.
Read PDFThe PKWARE Enterprise Manager is the central component of the Smartcrypt platform, allowing organizations to implement enterprise-wide encryption policies and maintain control over all encryption activity.
Read PDFSmartcrypt is the most flexible and powerful IBM Z encryption solution available. Smartcrypt protects both structured and unstructured data, gives customers the option to embed encryption directly into their applications, and can secure mainframe databases with field-level, length-preserving encryption.
Read PDFPKWARE's software development kit is the ideal solution for organizations who need to incorporate strong encryption into their products or systems. PKWARE delivers high performance, cross-platform security that is easily embedded, insulating sensitive data from weaknesses in other systems that may handle the information.
Read PDFGet the details on how PKWARE uses pattern recognition, dictionaries, and other tools to scan documents for sensitive data, while minimizing the possibility of false positives and false negatives.
Read PDFA closer look at PKWARE's plugin for Microsoft Outlook, including configuration options and details on outgoing and incoming email workflows.
Read PDFWhitepapers
In-depth analysis of data security issues, business trends, and emerging technology.
This paper provides a methodology for protecting CUI that is easy and cost-effective for an organization to implement and will satisfy the CMMC maturity requirements of a company’s DoD contracts. This CUI-centric data protection methodology assures that CUI data can only be accessed by employees and sub-contractors that have appropriate clearance, or program authorization from the government.
Read PDFEven though perimeter and network security have failed time and time again to secure data, few organizations understand how to properly implement data-centric security. This paper defines data-centric security, and provides not only an overview of its key principles, but also best practices for designing and implementing an effective solution.
Read PDFAs data volumes continue to increase and cyber threats grow harder to predict, data classification has emerged as an essential element of data-centric security.
Read PDFMaking Sense of Sensitive Data: How Integrated Discovery and Encryption Facilitate Meaningful Action
When organizations can simultaneously identify and encrypt sensitive information on file servers and user devices, they gain unprecedented control and visibility over their data, eliminating the obstacles to true enterprise information security.
Read PDFEach time an organization sends sensitive data outside its own network, it exposes itself to risks. PKWARE facilitates policy-based secure data exchange, without security gaps and without disrupting user workflows.
Read PDFRecent high-profile data breaches have demonstrated beyond question that network and device protection is not enough. True information security requires persistent data level protection, so that files and folders remain secure even after they leave a company’s systems.
Read PDFThe EU’s new General Data Protection Regulation brings fundamental change to the ways businesses and other organizations collect, store, and use personal information.
Read PDFThe strength of any cryptosystem depends in large part on the unpredictability of the data used in the encryption process. Unfortunately, some of today’s most commonly-used sources of “random” data depend on inputs that have the potential to inject predictable data, and therefore weakness, into the process.
Read PDFNew York’s 23 NYCRR 500, a set of cybersecurity mandates and recommendations for the financial services industry, took effect on March 1, 2017. The law is the first of its kind in the United States and represents an early step in what may become a nationwide movement to improve data security through increased regulation.
Read PDFCase Studies
When organizations face data security challenges, PKWARE has the right solutions.
See how one global company is using PKWARE 's data redaction technology to ensure PCI DSS compliance.
Read PDFThe Centers for Medicare & Medicaid Services (CMS) is responsible for safeguarding sensitive patient data, and also secures information exchanged between hundreds of partners at the federal and state level, as well as with universities and private businesses.
Read PDFA major healthcare software provider, despite its industry-leading reputation, recently found itself under pressure to enhance its data security capabilities. Many of the company’s largest customers had begun to request that it build strong encryption into its Electronic Health Records (EHR) software.
Read PDFSee how a major insurance company met customer demands for PCI-compliant encryption while securing its internal data against cyber threats with PKWARE's transparent data encryption.
Read PDFLearn how a fast-growing online education company met customer expectations for encrypting data at rest while laying a strong foundation for long-term data protection.
Read PDFIn one of the country’s largest cities, a government agency faced a series of challenges as it struggled to manage a rapidly increasing volume of secure data traffic.
Read PDFA high-profile federal government agency, tasked with ensuring the safety of millions of travelers each day, recently found that its data security policies had several significant weaknesses.
Read PDFSolution Sheets by Mandate
Find out how PKWARE can help you meet government mandates and industry requirements.
Companies can use PKWARE to meet a variety of NIST 800-171 standards and achieve the desired CMMC maturity level. Our solutions can be used to address requirements for data classification, data protection, encryption key management, and activity logging.
Read PDFThe General Data Protection Regulation (GDPR) is a new cybersecurity law that will take effect in the European Union in May 2018. The law introduces both new rights for EU citizens and new obligations for companies that collect, use, or process the personal information of EU citizens.
Read PDFPKWARE addresses the standards outlined in FIPS 140-2 by strongly encrypting the data itself. PKWARE's FIPS mode setting ensures only FIPS 140-2 validated cryptography is used and it avoids the need for setting disruptive operating system FIPS policy settings.
Read PDFTo improve the efficiency and effectiveness of the healthcare industry, vast amounts of patient information are being handled electronically. Therefore, there is an increased need for stronger data security.
Read PDFPKWARE’s automated data redaction technology removes credit card numbers from files based on organizational policy. Redaction takes data out of scope for PCI requirements, and ensures that cardholder data will not be exposed in the event of a computer theft or other security event.
Read PDFWith PKWARE, financial services organizations and their service providers can improve data security while ensuring compliance with NYCRR 500 mandates.
Read PDFPKWARE’s data-centric approach is aligned with the goals and strategies of the CDM program, and provides the capabilities government departments and agencies require in order to meet their data protection objectives.
Read PDFSolution Sheets by Use Case
Get the details on PKWARE's capabilities for data discovery, classification, and protection.
As more organizations adopt end-to-end encryption solutions, their DLP processes and technology have become less effective. PKWARE can integrate company-controlled encryption into DLP worlflows, improving security and performance.
Read PDFSmartcrypt's automated data protection workflow is ideal for encrypting surveillance footage and other video files that contain sensitive information.
Read PDFEmail communication creates multiple opportunities for sensitive data to be misdirected or intercepted. Find out how PKWARE keeps email messages safe from internal and external threats.
Read PDFPKWARE provides seamless key management in order to avoid direct user access to keys, key-rings, and public/private key files, etc. It allows encryption to be managed on an owner/recipient level, which avoids common key sharing and access issues.
Read PDFEvery organization needs to share sensitive information with external companies and individuals. As data volumes and data traffic continue to increase, data exchange becomes a greater necessity and a greater risk each year.
Read PDFSmartcrypt is the most flexible, high-performance z Systems encryption solution available today.
Read PDF