Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert

Case Studies


The Centers for Medicare & Medicaid Services (CMS) is responsible for safeguarding sensitive patient data, and also secures information exchanged between hundreds of partners at the federal and state level, as well as with universities and private businesses. As a result, there is zero tolerance for security breaches, and CMS must comply with ever-changing regulatory requirements...

Read PDF

A major healthcare software provider, despite its industry-leading reputation, recently found itself under pressure to enhance its data security capabilities. Many of the company’s largest customers had begun to request that it build strong encryption into its Electronic Health Records (EHR) software...

Read PDF

In 2014, one of the largest banks in the country suffered a data breach that compromised millions of customer records. The large-scale theft of unencrypted data resulted in significant SEC fines and a loss of shareholder and consumer confidence...

Read PDF

In one of the country’s largest cities, a government agency faced a series of challenges as it struggled to manage a rapidly increasing volume of secure data traffic...

Read PDF

A high-profile federal government agency, tasked with ensuring the safety of millions of travelers each day, recently found that its data security policies had several significant weaknesses....

Read PDF

Whitepapers


Recent high-profile data breaches have demonstrated beyond question that network and device protection is not enough. True information security requires persistent data level protection, so that files and folders remain secure even after they leave a company’s systems...

Read PDF

The EU’s new General Data Protection Regulation will fundamentally alter the way businesses and other organizations collect, store, and use personal information...

Read PDF

The stakes are getting higher every day. External security threats grow increasingly sophisticated and unpredictable. Internal controls become more complicated and challenging to implement. When data breaches do occur, the damage can take years to repair...

Read PDF

Customer Success Stories


Our client, a large healthcare organization, has become a nationally recognized leader in efforts to improve the quality of healthcare. The organization’s array of additional services includes community clinics in partnership with local medical schools, home care and hospice services, QuickCare clinics, and others. Our client needed a secure, reliable enterprise solution for data exchange that offered strong encryption in order to meet HIPAA regulations...

Read PDF

Our client, a national retailer with more than 175 locations across the United States, experienced a breach in security involving credit and debit card information. The breach raised questions about the company’s ability to protect confidential customer information...

Read PDF

In 2009, our client underwent an IT security audit in support of established FISMA guidelines; they were cited for deficiencies in access controls surrounding IT security. Specifically, they were found deficient in not adequately encrypting sensitive Personally Identifiable Information (PII) and Personal Health Information (PHI)...

Read PDF

The CIO for a growing, Midwest-based healthcare specialty software vendor faced increasing demand from his hospital system customers to add encryption for enhanced security and sharing in its Electronic Health Records (EHR) applications. Without guarantees on federal data compliance for Meaningful Use and FIPS, he couldn’t even get a call back from potential customers...

Read PDF

"What good is security if it's out of control?” That was the question a security manager asked his team of security architects at a top-5 global bank after they realized millions of monthly emails and messages went through applications and infrastructure without any insight...

Read PDF

Our client is an IT services consulting firm and leading provider of solutions that enable companies to maximize their use of advanced technology. When the company first contacted PKWARE, they had two immediate needs: 1) to compress large files stored on CD that are sent each night to various Federal agencies; and 2) encrypt the information being transferred in compliance with FIPS 140-2 requirements...

Read PDF

Our client is in possession of vast amounts of medical data and patient records for each person enrolled in the Medicare program, spanning a time frame of several years. As a result of data security standards and requirements, such as OMB M-06-16 and FIPS 140-2, it was absolutely critical that they find a solution that would comply with these mandates...

Read PDF

Our client is a Federal Government agency responsible for the safety of civil aviation. Two offices within our client agency took a proactive stance and concluded that they needed additional security around information that is exchanged daily via email and email attachments...

Read PDF

Our client is one of the world's leading financial services providers. As the client was preparing for a new system release, adding new features and functionality, their Data Security & Compliance Committee determined that the data being exchanged was sensitive in nature...

Read PDF

Our client is one of the world's largest financial institutions. The company needed to comply with the Payment Card Industry Data Security Standard (PCI DSS), which required them to protect credit card data as it is transmitted, processed, and/or stored, impacting several processes throughout their organization...

Read PDF

Our client is a non-profit teaching hospital and regional referral center offering full-service hospitals as well as specialty medical and surgical care. Each night, our client transfers large batches of Personally Identifiable Information (PII), including patient and procedure information, to partners such as collections companies, market research organizations, and government reporting agencies...

Read PDF

Our client is an organizational division of one of the largest publicly funded healthcare systems in the United Kingdom. Considering the vast amounts of sensitive data the organization handles, they first and foremost required a solution that would meet the AES 256-bit encryption standard...

Read PDF

Our client is one of the largest private forest landholders in North America. Processing times for backups was a continuous challenge for the company, and, as data volume increased, it was becoming more difficult to meet the times required for the processing window...

Read PDF

Our client is a provider of industrial automation power, control, and information systems and services. After conducting an internal audit, the company determined that they could be facing substantial fines for non-compliance with SOX requirements as a result of HR data that was being sent to a third-party provider...

Read PDF

Our client is a leading international specialty retailer offering clothing, accessories, and personal care products for men, women, and children. Wanting to avoid a breach and the negative publicity associated with it, the retailer took a proactive approach to data security and began planning, researching, and budgeting a security initiative a year in advance...

Read PDF

Our client is one of the nation’s top 20 retailers, with over 850 locations. The retailer was facing increasing pressure to comply with increased PCI DSS regulations, especially when exchanging information with business partners...

Read PDF

The Institute for Social and Economic Research (ISER) works closely with government departments who require compliance with FIPS 140-2. In addition, the ISER must comply with the Data Protection Act in Europe and the UK; however it didn’t want to compromise the productivity of its researchers and employees in the process of securing data...

Read PDF

Our client is one of the largest securities and data processing firms in the country. In their current operating environment, the company was using a method of secure FTP to transfer information from the mainframes within their data center. They realized that data leaving their facility was vulnerable and could end up unprotected in the wrong location...

Read PDF

Our client is a global provider of sophisticated information processing and computer software. The company exchanges sensitive financial information with their business partners, representing some of the largest mutual fund companies in the world...

Read PDF

Our client is a state government agency that serves as the Chief Financial Officer for their state, collecting billions of dollars each year in state and local tax revenue used for state-funded programs. They required a data security solution that would support varying transaction volumes and frequencies, but, at the same time, could address a broad range of technical capabilities that their business partners represented...

Read PDF

Our client is a state government agency charged with implementing the State’s public school laws, as well as the State Board of Education’s policies and procedures. Since the Agency is responsible for formalizing the education standards statewide, secure communication exchange is required between the state and individual counties...

Read PDF

Compliance


Smartcrypt fully addresses the standards outlined in FIPS 140-2 by strongly encrypting the data itself. PKWARE's own FIPS mode setting ensures only FIPS 140-2 validated cryptography is used and it avoids the need for setting disruptive operating system FIPS policy settings...

Read PDF

To improve the efficiency and effectiveness of the healthcare industry, vast amounts of patient information are being handled electronically. Therefore, there is an increased need for stronger data security...

Read PDF

OMB M-06-16 requires all federal government agencies and departments to secure sensitive information that is accessed remotely or stored off-site. This includes information that is physically transported outside of an agency’s perimeter, including information transported on removable media...

Read PDF

In February of 2009, the Health Information Technology for Economic and Clinical Health (HITECH) Act applies to “HIPAA covered entities and their business associates that access, maintain, retain, modify, record, store, destroy, or otherwise hold, use, or disclose unsecured protected health information...”

Read PDF

PKWARE’s Smartcrypt ensures that sensitive customer data remains secure within your organization’s network as it travels from user to user and platform to platform. Smartcrypt’s data-centric approach to security makes meeting specific requirements of PCI DSS easy...

Read PDF

Data Sheets


The stakes get higher every day. External security threats grow increasingly sophisticated and unpredictable. Internal controls become more complicated and challenging to implement. When data breaches do occur, the financial and PR damage can take years to repair. Security managers around the globe are facing the unavoidable truth that network and device protection is not enough. True information security requires persistent data-level protection, so that information remains inaccessible even after a security breach...

Read PDF

Available for both structured and unstructured data, the Smartcrypt SDK integrates at the data access layer of the application (not the database or storage layer), ensuring information is encrypted on capture and only decrypted when being displayed by an authorized application or device...

Read PDF

Product Overviews


Smartcrypt equips businesses with a data security solution that protects files and information, even if they have been moved outside the organization. Whether on smartphones, cloud storage services, or other external storage systems and environments, Smartcrypt enables organizations of all kinds to apply persistent data protection to their sensitive information...

Read PDF

The Smartcrypt SDK provides easy access for developers and architects to a host of encryption systems, algorithms, key interfaces and formats. Available in multiple languages on multiple platforms, the SDK handles all of the complexity and heavy lifting of the most well vetted and available cryptographic services...

Read PDF

Embedding encryption operations directly into an application Increases protection from security gaps existing in people, processes, and technology. Application layer encryption provides end-to-end protection, eliminating vulnerabilities in adjacent applications...

Read PDF

Smartcrypt for...


By protecting and compressing data, Smartcrypt helps banking and financial services organizations tackle the challenge of efficient data consolidation. Storage space is conserved. Sensitive information is secure. All without added infrastructure costs for you or your IT partners...

Read PDF

Whether you’re handling settlement, customer master, or general ledger files, your organization needs to exchange huge volumes of sensitive information. You need a solution that can respond to multiple security requirements with your IT budget constraints in mind...

Read PDF

As volumes of data continue to grow, IT budgets have been reduced, financial transaction settlement windows are contracting, and compliance-driven requirements are becoming more complex. You need a tailored solution that can address the problem without burdening your already constrained IT budgets and resources...

Read PDF

Smartcrypt helps banking and financial services companies tackle the challenge of increasing volumes of data. Insure that sensitive information remains secure and that SLAs are exceeded to reduce spending...

Read PDF

Doing business with government agencies means you have to comply with increasingly stringent security standards and requirements. Smartcrypt meets the encryption standards and regulations mandated by the U.S. Federal Government. Sensitive information is secure and the risk of lost revenue is eliminated...

Read PDF

An important part of an effective data security strategy is not only protecting your sensitive data, but also ensuring the right individuals within your organization can access it at any time. Smartcrypt allows IT administrators to ensure data availability across your organization...

Read PDF

Solution Sheets


Smartcrypt is the only offering that reduces and secures data with portability and interoperability across all major operating systems and devices. One solution, not several point products, handles structured and unstructured data for immediate access across your extended enterprise...

Read PDF

Exponential growth in enterprise electronic data, demands on data retention periods and an increased cost focus have led to a "perfect storm" in data proliferation...

Read PDF

In order to efficiently and effectively respond to business needs, large amounts of potentially sensitive data are exchanged frequently within an organization. Smartcrypt’s data-centric approach to security ensures that strong encryption is applied to the data and remains with it in storage...

Read PDF

As more organizations adopt end-to-end encryption solutions, their DLP processes and technology have become less effective. This has resulted in more blocks and redirects which slows down business velocity...

Read PDF

Internal policies, industry mandates, and government regulations demand strong protection of sensitive data. Non-compliance results in considerable fines and penalties...

Read PDF

Smartcrypt safeguards PHI at rest and in motion with persistent file level security that stays with the data, regardless of storage location or transfer method...

Read PDF

PKWARE’s Smartcrypt provides seamless key management in order to avoid direct user access to keys, key-rings, and public/private key files, etc. It allows encryption to be managed on an owner/recipient level, which avoids common key sharing and access issues...

Read PDF

PKWARE developers and sales teams have worked with numerous customers to add easy-to-use encryption that covers PCI requirements and extends security for the way today’s business share, store and access data...

Read PDF