When organizations face data security challenges, PKWARE has the right solutions.
The Centers for Medicare & Medicaid Services (CMS) is responsible for safeguarding sensitive patient data, and also secures information exchanged between hundreds of partners at the federal and state level, as well as with universities and private businesses. As a result, there is zero tolerance for security breaches, and CMS must comply with ever-changing regulatory requirements...Read PDF
A major healthcare software provider, despite its industry-leading reputation, recently found itself under pressure to enhance its data security capabilities. Many of the company’s largest customers had begun to request that it build strong encryption into its Electronic Health Records (EHR) software...Read PDF
In 2014, one of the largest banks in the country suffered a data breach that compromised millions of customer records. The large-scale theft of unencrypted data resulted in significant SEC fines and a loss of shareholder and consumer confidence...Read PDF
In one of the country’s largest cities, a government agency faced a series of challenges as it struggled to manage a rapidly increasing volume of secure data traffic...Read PDF
A high-profile federal government agency, tasked with ensuring the safety of millions of travelers each day, recently found that its data security policies had several significant weaknesses....Read PDF
In-depth analysis of data security issues, business trends, and emerging technology.
Recent high-profile data breaches have demonstrated beyond question that network and device protection is not enough. True information security requires persistent data level protection, so that files and folders remain secure even after they leave a company’s systems...Read PDF
The EU’s new General Data Protection Regulation will fundamentally alter the way businesses and other organizations collect, store, and use personal information...Read PDF
The stakes are getting higher every day. External security threats grow increasingly sophisticated and unpredictable. Internal controls become more complicated and challenging to implement. When data breaches do occur, the damage can take years to repair...Read PDF
Customer Success Stories
See how PKWARE’s innovative solutions are helping customers meet new challenges.
Our client, a large healthcare organization, has become a nationally recognized leader in efforts to improve the quality of healthcare. The organization’s array of additional services includes community clinics in partnership with local medical schools, home care and hospice services, QuickCare clinics, and others. Our client needed a secure, reliable enterprise solution for data exchange that offered strong encryption in order to meet HIPAA regulations...Read PDF
Our client, a national retailer with more than 175 locations across the United States, experienced a breach in security involving credit and debit card information. The breach raised questions about the company’s ability to protect confidential customer information...Read PDF
In 2009, our client underwent an IT security audit in support of established FISMA guidelines; they were cited for deficiencies in access controls surrounding IT security. Specifically, they were found deficient in not adequately encrypting sensitive Personally Identifiable Information (PII) and Personal Health Information (PHI)...Read PDF
The CIO for a growing, Midwest-based healthcare specialty software vendor faced increasing demand from his hospital system customers to add encryption for enhanced security and sharing in its Electronic Health Records (EHR) applications. Without guarantees on federal data compliance for Meaningful Use and FIPS, he couldn’t even get a call back from potential customers...Read PDF
"What good is security if it's out of control?” That was the question a security manager asked his team of security architects at a top-5 global bank after they realized millions of monthly emails and messages went through applications and infrastructure without any insight...Read PDF
Our client is an IT services consulting firm and leading provider of solutions that enable companies to maximize their use of advanced technology. When the company first contacted PKWARE, they had two immediate needs: 1) to compress large files stored on CD that are sent each night to various Federal agencies; and 2) encrypt the information being transferred in compliance with FIPS 140-2 requirements...Read PDF
Our client is in possession of vast amounts of medical data and patient records for each person enrolled in the Medicare program, spanning a time frame of several years. As a result of data security standards and requirements, such as OMB M-06-16 and FIPS 140-2, it was absolutely critical that they find a solution that would comply with these mandates...Read PDF
Our client is a Federal Government agency responsible for the safety of civil aviation. Two offices within our client agency took a proactive stance and concluded that they needed additional security around information that is exchanged daily via email and email attachments...Read PDF
Our client is one of the world's leading financial services providers. As the client was preparing for a new system release, adding new features and functionality, their Data Security & Compliance Committee determined that the data being exchanged was sensitive in nature...Read PDF
Our client is one of the world's largest financial institutions. The company needed to comply with the Payment Card Industry Data Security Standard (PCI DSS), which required them to protect credit card data as it is transmitted, processed, and/or stored, impacting several processes throughout their organization...Read PDF
Our client is a non-profit teaching hospital and regional referral center offering full-service hospitals as well as specialty medical and surgical care. Each night, our client transfers large batches of Personally Identifiable Information (PII), including patient and procedure information, to partners such as collections companies, market research organizations, and government reporting agencies...Read PDF
Our client is an organizational division of one of the largest publicly funded healthcare systems in the United Kingdom. Considering the vast amounts of sensitive data the organization handles, they first and foremost required a solution that would meet the AES 256-bit encryption standard...Read PDF
Our client is one of the largest private forest landholders in North America. Processing times for backups was a continuous challenge for the company, and, as data volume increased, it was becoming more difficult to meet the times required for the processing window...Read PDF
Our client is a provider of industrial automation power, control, and information systems and services. After conducting an internal audit, the company determined that they could be facing substantial fines for non-compliance with SOX requirements as a result of HR data that was being sent to a third-party provider...Read PDF
Our client is a leading international specialty retailer offering clothing, accessories, and personal care products for men, women, and children. Wanting to avoid a breach and the negative publicity associated with it, the retailer took a proactive approach to data security and began planning, researching, and budgeting a security initiative a year in advance...Read PDF
Our client is one of the nation’s top 20 retailers, with over 850 locations. The retailer was facing increasing pressure to comply with increased PCI DSS regulations, especially when exchanging information with business partners...Read PDF
The Institute for Social and Economic Research (ISER) works closely with government departments who require compliance with FIPS 140-2. In addition, the ISER must comply with the Data Protection Act in Europe and the UK; however it didn’t want to compromise the productivity of its researchers and employees in the process of securing data...Read PDF
Our client is one of the largest securities and data processing firms in the country. In their current operating environment, the company was using a method of secure FTP to transfer information from the mainframes within their data center. They realized that data leaving their facility was vulnerable and could end up unprotected in the wrong location...Read PDF
Our client is a global provider of sophisticated information processing and computer software. The company exchanges sensitive financial information with their business partners, representing some of the largest mutual fund companies in the world...Read PDF
Our client is a state government agency that serves as the Chief Financial Officer for their state, collecting billions of dollars each year in state and local tax revenue used for state-funded programs. They required a data security solution that would support varying transaction volumes and frequencies, but, at the same time, could address a broad range of technical capabilities that their business partners represented...Read PDF
Our client is a state government agency charged with implementing the State’s public school laws, as well as the State Board of Education’s policies and procedures. Since the Agency is responsible for formalizing the education standards statewide, secure communication exchange is required between the state and individual counties...Read PDF
Find out how PKWARE can help you meet government mandates and industry requirements.
Smartcrypt fully addresses the standards outlined in FIPS 140-2 by strongly encrypting the data itself. PKWARE's own FIPS mode setting ensures only FIPS 140-2 validated cryptography is used and it avoids the need for setting disruptive operating system FIPS policy settings...Read PDF
To improve the efficiency and effectiveness of the healthcare industry, vast amounts of patient information are being handled electronically. Therefore, there is an increased need for stronger data security...Read PDF
OMB M-06-16 requires all federal government agencies and departments to secure sensitive information that is accessed remotely or stored off-site. This includes information that is physically transported outside of an agency’s perimeter, including information transported on removable media...Read PDF
In February of 2009, the Health Information Technology for Economic and Clinical Health (HITECH) Act applies to “HIPAA covered entities and their business associates that access, maintain, retain, modify, record, store, destroy, or otherwise hold, use, or disclose unsecured protected health information...”Read PDF
Technical specifications and other key info on Smartcrypt and other PKWARE solutions.
Smartcrypt Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers, ensuring compliance with a wide range of regulatory requirements and customer privacy mandates. Smartcrypt TDE secures file and application data without application changes, additional infrastructure or professional services. No endpoint software is required and user experience is unaffected...Read PDF
The stakes get higher every day. External security threats grow increasingly sophisticated and unpredictable. Internal controls become more complicated and challenging to implement. When data breaches do occur, the financial and PR damage can take years to repair. Security managers around the globe are facing the unavoidable truth that network and device protection is not enough. True information security requires persistent data-level protection, so that information remains inaccessible even after a security breach...Read PDF
Available for both structured and unstructured data, the Smartcrypt SDK integrates at the data access layer of the application (not the database or storage layer), ensuring information is encrypted on capture and only decrypted when being displayed by an authorized application or device...Read PDF
Learn more about PKWARE’s industry-leading data security and file management solutions.
It’s time to rethink data breaches. While network and device centric security efforts are important, they leave security gaps which often go undetected and remain exploitable. Regulators, auditors, partners and customers are increasingly demanding that enterprises encrypt their data...Read PDF
Smartcrypt equips businesses with a data security solution that protects files and information, even if they have been moved outside the organization. Whether on smartphones, cloud storage services, or other external storage systems and environments, Smartcrypt enables organizations of all kinds to apply persistent data protection to their sensitive information...Read PDF
The Smartcrypt SDK provides easy access for developers and architects to a host of encryption systems, algorithms, key interfaces and formats. Available in multiple languages on multiple platforms, the SDK handles all of the complexity and heavy lifting of the most well vetted and available cryptographic services...Read PDF
Get the details on Smartcrypt’s revolutionary capabilities for encryption and key management.
By protecting and compressing data, Smartcrypt helps banking and financial services organizations tackle the challenge of efficient data consolidation. Storage space is conserved. Sensitive information is secure. All without added infrastructure costs for you or your IT partners...Read PDF
Whether you’re handling settlement, customer master, or general ledger files, your organization needs to exchange huge volumes of sensitive information. You need a solution that can respond to multiple security requirements with your IT budget constraints in mind...Read PDF
As volumes of data continue to grow, IT budgets have been reduced, financial transaction settlement windows are contracting, and compliance-driven requirements are becoming more complex. You need a tailored solution that can address the problem without burdening your already constrained IT budgets and resources...Read PDF
Smartcrypt helps banking and financial services companies tackle the challenge of increasing volumes of data. Insure that sensitive information remains secure and that SLAs are exceeded to reduce spending...Read PDF
Doing business with government agencies means you have to comply with increasingly stringent security standards and requirements. Smartcrypt meets the encryption standards and regulations mandated by the U.S. Federal Government. Sensitive information is secure and the risk of lost revenue is eliminated...Read PDF
An important part of an effective data security strategy is not only protecting your sensitive data, but also ensuring the right individuals within your organization can access it at any time. Smartcrypt allows IT administrators to ensure data availability across your organization...Read PDF
Industry-specific solutions that address today’s most significant data security challenges.
Smartcrypt is the only offering that reduces and secures data with portability and interoperability across all major operating systems and devices. One solution, not several point products, handles structured and unstructured data for immediate access across your extended enterprise...Read PDF
Exponential growth in enterprise electronic data, demands on data retention periods and an increased cost focus have led to a "perfect storm" in data proliferation...Read PDF
In order to efficiently and effectively respond to business needs, large amounts of potentially sensitive data are exchanged frequently within an organization. Smartcrypt’s data-centric approach to security ensures that strong encryption is applied to the data and remains with it in storage...Read PDF
As more organizations adopt end-to-end encryption solutions, their DLP processes and technology have become less effective. This has resulted in more blocks and redirects which slows down business velocity...Read PDF
Internal policies, industry mandates, and government regulations demand strong protection of sensitive data. Non-compliance results in considerable fines and penalties...Read PDF
Smartcrypt safeguards PHI at rest and in motion with persistent file level security that stays with the data, regardless of storage location or transfer method...Read PDF
PKWARE’s Smartcrypt provides seamless key management in order to avoid direct user access to keys, key-rings, and public/private key files, etc. It allows encryption to be managed on an owner/recipient level, which avoids common key sharing and access issues...Read PDF