Resource Center

The PKWARE Resource Center materials contain information and best practices to address your data discovery and protection challenges
  • Resource Type

  • By Product

  • By Solution

  • Sort By:

Solution Overview

NIST and CMMC Compliance

PK Protect simplifies compliance with NIST 800-171 and CMMC requirements as well as other government and industry mandates and regulations.
Solution Overview

Secure Z Systems Data and Reduce Resource Demands

PK Protect is different. Providing data-level encryption for IBM z Systems mainframes, PK Protect is the most flexible, high-performance z Systems encryption solution available today.
Solution Overview

Meeting NYCRR500 Requirements with PK Discovery and PK Encryption

Financial services organizations and their third party service providers can improve their data security and privacy protection while ensuring compliance with 23 NYCRR 500 and other government regulations and industry mandates.
Whitepaper

What’s Changing in Enterprise Data Discovery and Protection in 2021 and Beyond

As the year progresses, 2021 will introduce further data protection challenges and vulnerability soft spots to data-driven organizations. Companies recognize they now have to find new ways to continuously secure and shield their data.
eBook

Rethinking Data Management Practices for Privacy Compliance

Data privacy regulations remain notoriously difficult to put into practice compared to data security, which is supported by a growing constellation of standards and frameworks and other security best practices.
Case Study

Financial Services Company Simplifies Regulatory Compliance with Automated PII Discovery and Masking

With PKWARE in place, the company now has the ability to shift its focus away from the daunting task of locating sensitive data and now focus on other key aspects of its business—and look ahead to future regulations.
Whitepaper

Leveraging Core Privacy Rights to Build a Global Data Compliance Plan

While privacy laws are certainly not new, there is a continuing upward trajectory in the passing of privacy laws. Even older laws are up for review and modernization based on the foundational elements of GDPR. No business can afford to ignore the growing and evolving data protection regulation landscape. 
Case Study

Samsung

Samsung still needed to collect device data for analytics, but was mindful of privacy laws, and privacy fines levied on competitors that did not fully comply with privacy mandates.
Whitepaper

Smart Encryption Key Management

Recent high-profile data breaches have demonstrated beyond question that network and device protection is not enough. True information security requires persistent data-level protection, so that files and folders remain secure even after they leave a company’s systems.
Whitepaper

The Entropy Problem: Random Data and Secure Cryptography

Some of today’s most commonly used sources of “random” data depend on inputs that have the potential to inject predictable data, and therefore weakness, into the process.
Case Study

United HealthCare

UHC leverages PKWARE encryption technologies to fit its custom requirements for encryption and key management while providing seamless access to plain text data from a variety of data access contexts for authorized users utilizing flexible PKWARE decryption techniques.
Case Study

PKWARE Streamlines Data Exchange for City Government

The unique capabilities of PKWARE enabled several of the city’s IT departments to streamline their process for exchanging data while providing persistent protection for sensitive information.
Case Study

PKWARE Solves Federal Agency Security Challenges

In need of a new encryption solution, the Agency evaluated and selected PKWARE, based on PKWARE’s ability to render information inaccessible to anyone but authorized users, whether the data is at rest or in transit.
Case Study

Online Education Provider Secures Customer Data With PKWARE

A fast-growing provider of online education had just signed a contract with a significant new client, and now it had a significant new obligation to meet: encrypting its data.
Case Study

Healthcare Software Firm Implements Advanced Data Protection

A leading healthcare software company turned to PKWARE when it needs to implement strong, reliable data protection.
Solution Overview

TISAX Compliance

Information security mandates like TISAX are complex and multi-faceted, requiring the efforts of multiple departments within an organization, along with multiple vendors, partners, and advisors. No single technology solution will make your company TISAX-compliant. Wherever you are on your TISAX compliance journey, PKWARE can help.
Whitepaper

Policy-Driven Solutions for Secure Data Exchange

Each time an organization sends sensitive data outside its own network, it exposes itself to risks. Data can be intercepted en route, stolen from recipients, or passed along to unauthorized parties. The financial and public relations consequences of these types of data breach grow more severe each year.
eBook

Simplifying GDPR Compliance with PKWARE

The General Data Protection Regulation (GDPR) may have been created in the European Union (EU), but this consumer privacy law applies to any organization, anywhere in the world, that controls or processes the personal data of EU residents.
eBook

Securely and Selectively Migrating Enterprise Data to the Cloud

To move data to the cloud, enterprises faced a new dimension in their security challenge—to ensure that no PII, PCI, HIPAA, or data complying with a similar policy could leave their on-premises environment.
Case Study

Insurance Company Meets Data Protection Goals with PKWARE TDE

An insurance company uses PKWARE’s transparent data encryption to secure customer data and its own internal files.
Datasheet

PK Encryption Datasheet

PK Encryption protects your business from financial and brand damage by ensuring that your sensitive information is encrypted with the best technology available.
Whitepaper

Making Sense of Sensitive Data: How Data Discovery Facilitates Meaningful Action on Unstructured Data

Uncertainty about the extent and nature of sensitive data, together with concerns about software usability and effectiveness, can leave an organization unable to commit to a data-centric approach to information security. Integration between data discovery and data protection is the missing link.
eBook

CCPA Overview

Compliance with privacy regulations such as California Consumer Protection Act (CCPA) are best met by following strategic, targeted operational processes (privacy operations) and technological processes (privacy engineering) in tandem. But there's still a lot to unpack in there.
Whitepaper

Securing Hadoop: Discovering and Securing Sensitive Data in Hadoop Data Stores

The rapid expansion of corporate data being transferred or collected and stored in Hadoop HDFS is creating a critical problem for Chief Information Security Officers, compliance professionals, and IT staff responsible for data management and security.
Datasheet

PK Protect Datasheet

PK Protect enables enterprise-wide sensitive data protection, safeguarding people’s privacy and the entire organization’s security.
Video

PK Privacy Overview

Watch to learn how PK Privacy enables your organization to have the customizable methodologies, tools, and techniques to control data and achieve the required and acceptable levels of privacy.
Video

PK Encryption Overview

Watch the video to learn how PKWARE’s PK Encryption solution quickly safeguards data, giving you complete control over how – and when – you secure your sensitive information.
Whitepaper

Simplify PCI Compliance with Smarter Scope Management

Since its introduction in 2006, the Payment Card Industry Data Security Standard (PCI DSS) has provided a common framework of technical and operational requirements for protecting cardholder account data. If your company, products, services, or even partners are involved in payment card processing, the PCI DSS applies to you.
Datasheet

PK Classification Datasheet

PK Classification categorizes data based on custom or predefined policies to ensure sensitive data security and privacy.
Datasheet

PK Masking Datasheet

PK Masking’s data protection technology can be applied at scale, masking or redacting sensitive information across petabytes of data.
Solution Overview

FIPS 140-Compliant Encryption

FIPS 140 requires all federal government agencies and departments that use cryptographic-based security to meet specific standards related to encryption strength and capabilities.
Whitepaper

A Blueprint for Data-Centric Security

Perimeter breaches will become even more common in the years to come as data volumes continue to grow and IT architecture evolves away from traditional network-based models. In our new digital environment, data-centric security is the only viable option for keeping sensitive information safe.
Case Study

CMS Secures Medical Data and Facilitates Partner Compliance

Find out how The Centers for Medicare and Medicaid Services uses PKWARE to protect its data and ensure secure data exchange with hundreds of partner organizations.
eBook

Maintaining Continuous Visibility of Personal Data Across the Enterprise

Data is being shared in the cloud and around the globe in millions of digital channels. Every electronic device—at home, at work, on the go—is constantly transmitting personal information, and companies need to locate and properly label and treat all of it.
Case Study

Global Corporation Secures Data and Meets PCI Compliance Goals

PKWARE’s data-centric approach to security helped one of the world’s largest companies secure millions of unprotected files before a critical compliance audit.
Datasheet

PK Discovery Datasheet

PK Discovery is purpose-built to locate, identify, count, and report all sensitive data, from data repositories and servers—both on-premises and cloud-based—to endpoint files.
Datasheet

PK Privacy Datasheet

Using PKWARE technology to establish and manage your organization's Privacy Operations puts you in full control.
Solution Overview

PK Encryption: Outlook Integration

With PK Encryption, documents, spreadsheets, and other sensitive files remain safe from unauthorized access, even when saved to a message recipient's computer or shared in the cloud.
Solution Overview

Make DLP Processes More Efficient and Effective

PKWARE’s DLP enhancement capabilities integrate with your organization’s existing DLP technology to facilitate scanning of encrypted data, as well as remediation of unprotected data.
Video

PK Masking Overview

Fully utilized data is a company’s most valuable asset – but when it isn’t protected appropriately, it becomes a liability. Watch to learn how PK Masking addresses this with two powerful capabilities, static masking or dynamic masking.
Video

PK Discovery Overview

Watch the video to learn more about how PK Discovery’s powerful machine learning finds information stored on file servers, databases, and endpoint devices, wherever it lives in the enterprise, even if it’s semantically ambiguous.
Video

PK Protect Overview

Watch the PK Protect video to learn more about PKWARE's powerful, automated, and easy-to-use data protection solutions balancing data usage with data protection.
Case Study

Customized Data Masking for ARI Fleet

PKWARE’s value allowed ARI to focus on its core business without massive investments in time and resources, while still accomplishing the critical objectives of protecting sensitive data.
Case Study

Bank Gains Control over Sensitive Data with PKWARE DLP Enhancement

A global bank uses PKWARE technology to solve a complex data security challenge.
eBook

Is Sensitive Data Safe in the Cloud?

Whether you are pondering a move to the cloud, already in the cloud, or expanding to multiple cloud platforms, it’s time to get a true assessment of your risk and learn how to manage sensitive data in the cloud with confidence.
Case Study

Large Enterprise Financial Services Company

This case study of a large enterprise financial services company is based on a December 2020 survey of Dataguise customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study

Great Eastern Assurance

This case study of Great Eastern Assurance is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
eBook

A Blueprint for CUI Security Compliance

The Department of Defense has rolled out a compliance certification regimeusing a cyber maturity model framework (CMMC). Vendors to the DoD will be required to have a third-party assessment of the company's cyber controls that attest that the company is able to protect controlled unclassified information (CUI) under the CMMC guidelines.
Case Study

State and Local Government #2

This case study of a state and local government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study

Fortune 500 Healthcare Company

This case study of a Fortune 500 healthcare company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study

State and Local Government

This case study of a state and local government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study

Small Business Marketing and Advertising Company

This case study of a small business marketing and advertising company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study

Mission: Cyber, LLC

This case study of Mission: Cyber, LLC is based on an August 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study

Data Privacy and Protection at a US Healthcare Services Company

The customer's data lake team was in the process of updating their environment to provide subject matter experts access to raw data with context for analytics, yet, being regulated by HIPAA, the first challenge was that to identify a platform-agnostic masking solution for all the PHI and PII.
Case Study

Global 500 Financial Services Co.

This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study

Global 500 Financial Services Company

This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study

Data Privacy and Protection at Global Biotech

This PKWARE customer is a biotechnology company based in California and is dedicated to scientific research and development for medicines to treat people with serious and life-threatening diseases.
Case Study

AWS Customer Snapshot: Financial Services Leader

Digital is redefining the banking industry, as mobile technologies, social media, and the Internet of Things (IoT) are generating unprecedented volumes of data about customers. Financial services firms that are able to harness this data to uncover new business insights and develop the digital tools customers want—even before they know they want them—will be the winners in this new competitive landscape.
Case Study

Todo En La Nube S De Rl De Cv (HQ)

This case study of TODO EN LA NUBE S DE RL DE CV (HQ) is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study

Hidada

This case study of Hidada is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study

Federal Government

This case study of a federal government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study

Data Privacy, Protection, and Compliance at a Global Medical Equipment and Services Company

This customer had to find a reliable and automated service solution to identify and mask all the personal and sensitive elements in all their growing data reliably. The medical devices worn by users were generating 1-1.5 GB of new data every 10 minutes.
Case Study

Large Enterprise Financial Services Company

This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study

AWS Customer Snapshot: Miri Infotech

By including PKWARE in 2016 within their suite of services, Miri has been able to uncover vulnerable sensitive data and secure new customers across Healthcare, Financial Services and Education industries, reducing time in Proof of Concepts (POC’s) from weeks to a couple days.