Resource Center
The PKWARE Resource Center materials contain information and best practices to address your data discovery and protection challenges
Case Study
Samsung
Samsung still needed to collect device data for analytics, but was mindful of privacy laws, and privacy fines levied on competitors that did not fully comply with privacy mandates.
Whitepaper
Smart Encryption Key Management
Recent high-profile data breaches have demonstrated beyond question that network and device protection is not enough. True information security requires persistent data-level protection, so that files and folders remain secure even after they leave a company’s systems.
Whitepaper
The Entropy Problem: Random Data and Secure Cryptography
Some of today’s most commonly used sources of “random” data depend on inputs that have the potential to inject predictable data, and therefore weakness, into the process.
Case Study
United HealthCare
UHC leverages PKWARE encryption technologies to fit its custom requirements for encryption and key management while providing seamless access to plain text data from a variety of data access contexts for authorized users utilizing flexible PKWARE decryption techniques.
Case Study
PKWARE Streamlines Data Exchange for City Government
The unique capabilities of PKWARE enabled several of the city’s IT departments to streamline their process for exchanging data while providing persistent protection for sensitive information.
Case Study
PKWARE Solves Federal Agency Security Challenges
In need of a new encryption solution, the Agency evaluated and selected PKWARE, based on PKWARE’s ability to render information inaccessible to anyone but authorized users, whether the data is at rest or in transit.
Case Study
Online Education Provider Secures Customer Data With PKWARE
A fast-growing provider of online education had just signed a contract with a significant new client, and now it had a significant new obligation to meet: encrypting its data.
Case Study
Healthcare Software Firm Implements Advanced Data Protection
A leading healthcare software company turned to PKWARE when it needs to implement strong, reliable data protection.
Solution Overview
TISAX Compliance
Information security mandates like TISAX are complex and multi-faceted, requiring the efforts of multiple departments within an organization, along with multiple vendors, partners, and advisors. No single technology solution will make your company TISAX-compliant. Wherever you are on your TISAX compliance journey, PKWARE can help.
Whitepaper
Policy-Driven Solutions for Secure Data Exchange
Each time an organization sends sensitive data outside its own network, it exposes itself to risks. Data can be intercepted en route, stolen from recipients, or passed along to unauthorized parties. The financial and public relations consequences of these types of data breach grow more severe each year.
eBook
Simplifying GDPR Compliance with PKWARE
The General Data Protection Regulation (GDPR) may have been created in the European Union (EU), but this consumer privacy law applies to any organization, anywhere in the world, that controls or processes the personal data of EU residents.
eBook
Securely and Selectively Migrating Enterprise Data to the Cloud
To move data to the cloud, enterprises faced a new dimension in their security challenge—to ensure that no PII, PCI, HIPAA, or data complying with a similar policy could leave their on-premises environment.
Case Study
Insurance Company Meets Data Protection Goals with PKWARE TDE
An insurance company uses PKWARE’s transparent data encryption to secure customer data and its own internal files.
Datasheet
PK Encryption Datasheet
PK Encryption protects your business from financial and brand damage by ensuring that your sensitive information is encrypted with the best technology available.
Whitepaper
Making Sense of Sensitive Data: How Data Discovery Facilitates Meaningful Action on Unstructured Data
Uncertainty about the extent and nature of sensitive data, together with concerns about software usability and effectiveness, can leave an organization unable to commit to a data-centric approach to information security. Integration between data discovery and data protection is the missing link.
eBook
CCPA Overview
Compliance with privacy regulations such as California Consumer Protection Act (CCPA) are best met by following strategic, targeted operational processes (privacy operations) and technological processes (privacy engineering) in tandem. But there's still a lot to unpack in there.
Whitepaper
Securing Hadoop: Discovering and Securing Sensitive Data in Hadoop Data Stores
The rapid expansion of corporate data being transferred or collected and stored in Hadoop HDFS is creating a critical problem for Chief Information Security Officers, compliance professionals, and IT staff responsible for data management and security.
Datasheet
PK Protect Datasheet
PK Protect enables enterprise-wide sensitive data protection, safeguarding people’s privacy and the entire organization’s security.
Video
PK Privacy Overview
Watch to learn how PK Privacy enables your organization to have the customizable methodologies, tools, and techniques to control data and achieve the required and acceptable levels of privacy.
Video
PK Encryption Overview
Watch the video to learn how PKWARE’s PK Encryption solution quickly safeguards data, giving you complete control over how – and when – you secure your sensitive information.
Whitepaper
Simplify PCI Compliance with Smarter Scope Management
Since its introduction in 2006, the Payment Card Industry Data Security Standard (PCI DSS) has provided a common framework of technical and operational requirements for protecting cardholder account data. If your company, products, services, or even partners are involved in payment card processing, the PCI DSS applies to you.
Datasheet
PK Classification Datasheet
PK Classification categorizes data based on custom or predefined policies to ensure sensitive data security and privacy.
Datasheet
PK Masking Datasheet
PK Masking’s data protection technology can be applied at scale, masking or redacting sensitive information across petabytes of data.
Solution Overview
FIPS 140-Compliant Encryption
FIPS 140 requires all federal government agencies and departments that use cryptographic-based security to meet specific standards related to encryption strength and capabilities.
Whitepaper
A Blueprint for Data-Centric Security
Perimeter breaches will become even more common in the years to come as data volumes continue to grow and IT architecture evolves away from traditional network-based models. In our new digital environment, data-centric security is the only viable option for keeping sensitive information safe.
Case Study
CMS Secures Medical Data and Facilitates Partner Compliance
Find out how The Centers for Medicare and Medicaid Services uses PKWARE to protect its data and ensure secure data exchange with hundreds of partner organizations.
eBook
Maintaining Continuous Visibility of Personal Data Across the Enterprise
Data is being shared in the cloud and around the globe in millions of digital channels. Every electronic device—at home, at work, on the go—is constantly transmitting personal information, and companies need to locate and properly label and treat all of it.
Case Study
Global Corporation Secures Data and Meets PCI Compliance Goals
PKWARE’s data-centric approach to security helped one of the world’s largest companies secure millions of unprotected files before a critical compliance audit.
Datasheet
PK Discovery Datasheet
PK Discovery is purpose-built to locate, identify, count, and report all sensitive data, from data repositories and servers—both on-premises and cloud-based—to endpoint files.
Datasheet
PK Privacy Datasheet
Using PKWARE technology to establish and manage your organization's Privacy Operations puts you in full control.
Solution Overview
PK Encryption: Outlook Integration
With PK Encryption, documents, spreadsheets, and other sensitive files remain safe from unauthorized access, even when saved to a message recipient's computer or shared in the cloud.
Solution Overview
Make DLP Processes More Efficient and Effective
PKWARE’s DLP enhancement capabilities integrate with your organization’s existing DLP technology to facilitate scanning of encrypted data, as well as remediation of unprotected data.
Video
PK Masking Overview
Fully utilized data is a company’s most valuable asset – but when it isn’t protected appropriately, it becomes a liability. Watch to learn how PK Masking addresses this with two powerful capabilities, static masking or dynamic masking.
Video
PK Discovery Overview
Watch the video to learn more about how PK Discovery’s powerful machine learning finds information stored on file servers, databases, and endpoint devices, wherever it lives in the enterprise, even if it’s semantically ambiguous.
Video
PK Protect Overview
Watch the PK Protect video to learn more about PKWARE's powerful, automated, and easy-to-use data protection solutions balancing data usage with data protection.
Case Study
Customized Data Masking for ARI Fleet
PKWARE’s value allowed ARI to focus on its core business without massive investments in time and resources, while still accomplishing the critical objectives of protecting sensitive data.
Case Study
Bank Gains Control over Sensitive Data with PKWARE DLP Enhancement
A global bank uses PKWARE technology to solve a complex data security challenge.
eBook
Is Sensitive Data Safe in the Cloud?
Whether you are pondering a move to the cloud, already in the cloud, or expanding to multiple cloud platforms, it’s time to get a true assessment of your risk and learn how to manage sensitive data in the cloud with confidence.
Case Study
Large Enterprise Financial Services Company
This case study of a large enterprise financial services company is based on a December 2020 survey of Dataguise customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Great Eastern Assurance
This case study of Great Eastern Assurance is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
eBook
A Blueprint for CUI Security Compliance
The Department of Defense has rolled out a compliance certification regimeusing a cyber maturity model framework (CMMC). Vendors to the DoD will be required to have a third-party assessment of the company's cyber controls that attest that the company is able to protect controlled unclassified information (CUI) under the CMMC guidelines.
Case Study
State and Local Government #2
This case study of a state and local government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study
Fortune 500 Healthcare Company
This case study of a Fortune 500 healthcare company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
State and Local Government
This case study of a state and local government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study
Small Business Marketing and Advertising Company
This case study of a small business marketing and advertising company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Mission: Cyber, LLC
This case study of Mission: Cyber, LLC is based on an August 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Magellan Health
Magellan’s data lake team was in the process of updating their environment to provide subject matter experts access to raw data with context for analytics, yet, being regulated by HIPAA, the first challenge was that to identify a platform-agnostic masking solution for all the PHI and PII.
Case Study
Global 500 Financial Services Co.
This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Global 500 Financial Services Company
This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Data Privacy and Protection at Global Biotech
This PKWARE customer is a biotechnology company based in California and is dedicated to scientific research and development for medicines to treat people with serious and life-threatening diseases.
Case Study
AWS Customer Snapshot: Financial Services Leader
Digital is redefining the banking industry, as mobile technologies, social media, and the Internet of Things (IoT) are generating unprecedented volumes of data about customers. Financial services firms that are able to harness this data to uncover new business insights and develop the digital tools customers want—even before they know they want them—will be the winners in this new competitive landscape.
Case Study
Todo En La Nube S De Rl De Cv (HQ)
This case study of TODO EN LA NUBE S DE RL DE CV (HQ) is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Hidada
This case study of Hidada is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Federal Government
This case study of a federal government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study
Data Privacy, Protection, and Compliance at a Global Medical Equipment and Services Company
This customer had to find a reliable and automated service solution to identify and mask all the personal and sensitive elements in all their growing data reliably. The medical devices worn by users were generating 1-1.5 GB of new data every 10 minutes.
Case Study
Large Enterprise Financial Services Company
This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
AWS Customer Snapshot: Miri Infotech
By including PKWARE in 2016 within their suite of services, Miri has been able to uncover vulnerable sensitive data and secure new customers across Healthcare, Financial Services and Education industries, reducing time in Proof of Concepts (POC’s) from weeks to a couple days.
Case Study
ResMed
As ResMed participates in healthcare, they are required to secure PHI according to US Health Insurance Portability and Accountability Act (HIPAA) as well as PII according to the EU General Data Protection Regulations (GDPR) as of 2018.