Resource Center
The PKWARE Resource Center materials contain information and best practices to address your data discovery and protection challenges
Case Study
Crédit Agricole Leverages Seamless Encryption for IBM Mainframe
Crédit Agricole's familiarity with PKWARE solutions created a seamless and easy upgrade from compression to encryption.
Solution Overview
Safeguarding Intellectual Property
Download this solution overview to learn more about how PKWARE can help companies and governments be prepared for ever-intensifying cyberattacks that target intellectual property.
Case Study
UK Retail Banking Company
As one of the UK’s “Big Four” clearing banks, this large retail bank boasts an extensive network of branches and serves more than 16 million personal customers and small business accounts.
Solution Overview
Safeguarding Data During Cloud Migration
PK Protect plays a vital role in cloud strategy by automatically scanning and acting on all migrations to keep data safe.
Solution Overview
PK Protect: De-Risking Acquired Data in Mergers and Acquisitions
Any company acquiring a new business is also acquiring all their data assets, and with that, the liability of safeguarding them. Fortunately, PKWARE’s data solutions are purpose-built to de-risk data
Case Study
Omnicare, Inc.
This case study of Omnicare, Inc. is based on a December 2021 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Global 500 Professional Services Company
This case study of a Global 500 professional services company is based on a December 2021 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Large Enterprise Financial Services Company
This case study of a large enterprise financial services company is based on a December 2021 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Large Enterprise Healthcare Company
This case study of a large enterprise healthcare company is based on a December 2021 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Solution Overview
Data Governance
Download this solution overview to learn more about how PK Protect helps organizations support full-breadth data governance across the entire enterprise, starting with knowing where data is located so that it can be protected.
Solution Overview
PK Protect: Multi-Mandate Data Compliance
Download this solution overview to learn more about how PKWARE’s PK Protect technology solution suite empowers organizations to find, protect, share, and remediate personal data for full compliance with legal requirements including: CCPA, GDPA, PCI DSS, HIPAA, ITAR, SOX and TISAX.
Case Study
Fortune 250 Financial Group
This customer, who operates multiple insurance and investment management businesses through subsidiary companies, needed scanning for sensitive data on both Development and Production environments, including AWS sources, to support their new Cloud first strategy.
Case Study
Fortune 500 Financial Services
One of the largest property and casualty insurance companies in the United States, this Fortune 500 financial services group needed a means of discovering sensitive data from its AWS sources and protecting it with masking.
Case Study
Commercial Banking
This customer needed to identify sensitive information in specific file formats, remediate any false-positives, and mask sensitive data.
Case Study
Global 500 Pharmaceuticals Company
This case study of a Global 500 pharmaceuticals company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Small Business Marketing and Advertising Company
This case study of a small business marketing & advertising company is based on a June 2021 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Large Enterprise Banking Company
This case study of a large enterprise banking company is based on a July 2021 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Global 500 Professional Services Company
This case study of a Global 500 professional services company is based on a June 2021 survey of PKWARE customers by TechValidate, a third-party research service.
eBook
Metadata Management: What It Is and Why Your Business Needs It
Data and, by extension, metadata will continually be on the rise, challenging data governance processes to keep up so that data is both usable and protected.
Solution Overview
Achieving and Maintaining PCI DSS Compliance
PK Protect is the best choice in securing cardholder data, providing sensitive data discovery and management for both achieving and sustaining PCI DSS compliance.
Solution Overview
Persistent Data Security that Enhances DLP Processes and Technology
Organizations need flexible data security solutions that work with existing DLP to satisfy audit and compliance requirements. PKWARE’s PK Protect suite integrates with DLP for both sensitive information discovery and encrypted remediation.
eBook
Balancing Consumer Privacy Rights with Data Communication Needs: Five Factors to Consider in Commercial Banking
Because the United States lacks a single, comprehensive federal law to regulate both the collection and use of personal information, the resulting regulations for banking often create overlapping and contradictory protections.
Solution Overview
PK Protect: Endpoint Data Protection
The right endpoint security solution can help organizations detect suspicious instances of data being moved around inside and outside of an organization. PK Protect provides revolutionary data protection that automatically discovers and protects critical information, even when it moves outside of the organization.
Solution Overview
Collibra Solution Overview
With PKWARE's automated file redaction technology, organizations can remediate sensitive data as soon as it arrives, and also remove credit card numbers from legacy data, taking petabytes of stored data out of PCI DSS scope.
eBook
What’s Next After Achieving PCI DSS Compliance: Building A Sustainable Strategy
One study found that only one third of companies are still PCI DSS compliant one year after their initial validation. And non-compliant merchants run a higher risk of breach, audit, fines, and damage to brand reputation. Compliance must be an ongoing endeavor; focusing solely on the annual assessment may create a false sense of security.
Whitepaper
23 NYCRR 500 Readiness with PK Protect
The State of New York adopted mandates and requirements for financial services institutions licensed or authorized by The New York State Department of Financial Services (DFS) to conduct business. 23 […]
Solution Overview
Automated Ongoing File Redaction for PCI DSS
With PKWARE's automated file redaction technology, organizations can remediate sensitive data as soon as it arrives, and also remove credit card numbers from legacy data, taking petabytes of stored data out of PCI DSS scope.
Solution Overview
Secure Data Sharing
Organizations using PKWARE’s PK Protect can securely employ an array of appropriate methods to protect sensitive data transfers.
Solution Overview
Simplify HIPAA Compliance with PKWARE
PKWARE can help your organization protect all PHI throughout the data lifecycle—regardless of how or where it is stored or used—supporting your compliance with HIPAA’s privacy and security rules and other requirements for compliance.
Solution Overview
Video Encryption
PKWARE’s PK Protect provides an automated workflow for detecting and protecting video content as soon as it appears on a server or user device. Video files can be tagged and encrypted with no manual intervention, ensuring that only authorized users can access the files.
eBook
Building Seamless Key Management Strategies
Sensitive data resides in multiple storage and device locations throughout an organization. This means keys must be managed in a practical, automated, and risk-mitigated way throughout their lifecycle, with only credentialed entities accessing them.
Solution Overview
NIST and CMMC Compliance
PK Protect simplifies compliance with NIST 800-171 and CMMC requirements as well as other government and industry mandates and regulations.
Solution Overview
Secure Z Systems Data and Reduce Resource Demands
PK Protect is different. Providing data-level encryption for IBM z Systems mainframes, PK Protect is the most flexible, high-performance z Systems encryption solution available today.
Solution Overview
Meeting NYCRR500 Requirements with PK Discovery and PK Encryption
Financial services organizations and their third party service providers can improve their data security and privacy protection while ensuring compliance with 23 NYCRR 500 and other government regulations and industry mandates.
Whitepaper
What’s Changing in Enterprise Data Discovery and Protection in 2021 and Beyond
As the year progresses, 2021 will introduce further data protection challenges and vulnerability soft spots to data-driven organizations. Companies recognize they now have to find new ways to continuously secure and shield their data.
eBook
Rethinking Data Management Practices for Privacy Compliance
Data privacy regulations remain notoriously difficult to put into practice compared to data security, which is supported by a growing constellation of standards and frameworks and other security best practices.
Case Study
Financial Services Company Simplifies Regulatory Compliance with Automated PII Discovery and Masking
With PKWARE in place, the company now has the ability to shift its focus away from the daunting task of locating sensitive data and now focus on other key aspects of its business—and look ahead to future regulations.
Whitepaper
Leveraging Core Privacy Rights to Build a Global Data Compliance Plan
While privacy laws are certainly not new, there is a continuing upward trajectory in the passing of privacy laws. Even older laws are up for review and modernization based on the foundational elements of GDPR. No business can afford to ignore the growing and evolving data protection regulation landscape.
Whitepaper
Smart Encryption Key Management
Recent high-profile data breaches have demonstrated beyond question that network and device protection is not enough. True information security requires persistent data-level protection, so that files and folders remain secure even after they leave a company’s systems.
Whitepaper
The Entropy Problem: Random Data and Secure Cryptography
Some of today’s most commonly used sources of “random” data depend on inputs that have the potential to inject predictable data, and therefore weakness, into the process.
Case Study
United HealthCare
UHC leverages PKWARE encryption technologies to fit its custom requirements for encryption and key management while providing seamless access to plain text data from a variety of data access contexts for authorized users utilizing flexible PKWARE decryption techniques.
Case Study
PKWARE Streamlines Data Exchange for City Government
The unique capabilities of PKWARE enabled several of the city’s IT departments to streamline their process for exchanging data while providing persistent protection for sensitive information.
Case Study
PKWARE Solves Federal Agency Security Challenges
In need of a new encryption solution, the Agency evaluated and selected PKWARE, based on PKWARE’s ability to render information inaccessible to anyone but authorized users, whether the data is at rest or in transit.
Case Study
Online Education Provider Secures Customer Data With PKWARE
A fast-growing provider of online education had just signed a contract with a significant new client, and now it had a significant new obligation to meet: encrypting its data.
Case Study
Healthcare Software Firm Implements Advanced Data Protection
A leading healthcare software company turned to PKWARE when it needs to implement strong, reliable data protection.
Solution Overview
TISAX Compliance
Information security mandates like TISAX are complex and multi-faceted, requiring the efforts of multiple departments within an organization, along with multiple vendors, partners, and advisors. No single technology solution will make your company TISAX-compliant. Wherever you are on your TISAX compliance journey, PKWARE can help.
Whitepaper
Policy-Driven Solutions for Secure Data Exchange
Each time an organization sends sensitive data outside its own network, it exposes itself to risks. Data can be intercepted en route, stolen from recipients, or passed along to unauthorized parties. The financial and public relations consequences of these types of data breach grow more severe each year.
eBook
Simplifying GDPR Compliance with PKWARE
The General Data Protection Regulation (GDPR) may have been created in the European Union (EU), but this consumer privacy law applies to any organization, anywhere in the world, that controls or processes the personal data of EU residents.
eBook
Securely and Selectively Migrating Enterprise Data to the Cloud
To move data to the cloud, enterprises faced a new dimension in their security challenge—to ensure that no PII, PCI, HIPAA, or data complying with a similar policy could leave their on-premises environment.
Case Study
Insurance Company Meets Data Protection Goals with PKWARE TDE
An insurance company uses PKWARE’s transparent data encryption to secure customer data and its own internal files.
Datasheet
PK Encryption Datasheet
PK Encryption protects your business from financial and brand damage by ensuring that your sensitive information is encrypted with the best technology available.
Whitepaper
Making Sense of Sensitive Data: How Data Discovery Facilitates Meaningful Action on Unstructured Data
Uncertainty about the extent and nature of sensitive data, together with concerns about software usability and effectiveness, can leave an organization unable to commit to a data-centric approach to information security. Integration between data discovery and data protection is the missing link.
eBook
CCPA Overview
Compliance with privacy regulations such as California Consumer Protection Act (CCPA) are best met by following strategic, targeted operational processes (privacy operations) and technological processes (privacy engineering) in tandem. But there's still a lot to unpack in there.
Whitepaper
Securing Hadoop: Discovering and Securing Sensitive Data in Hadoop Data Stores
The rapid expansion of corporate data being transferred or collected and stored in Hadoop HDFS is creating a critical problem for Chief Information Security Officers, compliance professionals, and IT staff responsible for data management and security.
Datasheet
PK Protect Datasheet
PK Protect enables enterprise-wide sensitive data protection, safeguarding people’s privacy and the entire organization’s security.
Video
PK Privacy Overview
Watch to learn how PK Privacy enables your organization to have the customizable methodologies, tools, and techniques to control data and achieve the required and acceptable levels of privacy.
Video
PK Encryption Overview
Watch the video to learn how PKWARE’s PK Encryption solution quickly safeguards data, giving you complete control over how – and when – you secure your sensitive information.
Whitepaper
Simplify PCI Compliance with Smarter Scope Management
Since its introduction in 2006, the Payment Card Industry Data Security Standard (PCI DSS) has provided a common framework of technical and operational requirements for protecting cardholder account data. If your company, products, services, or even partners are involved in payment card processing, the PCI DSS applies to you.
Datasheet
PK Classification Datasheet
PK Classification categorizes data based on custom or predefined policies to ensure sensitive data security and privacy.
Datasheet
PK Masking Datasheet
PK Masking’s data protection technology can be applied at scale, masking or redacting sensitive information across petabytes of data.
Solution Overview
FIPS 140-Compliant Encryption
FIPS 140 requires all federal government agencies and departments that use cryptographic-based security to meet specific standards related to encryption strength and capabilities.
Whitepaper
A Blueprint for Data-Centric Security
Perimeter breaches will become even more common in the years to come as data volumes continue to grow and IT architecture evolves away from traditional network-based models. In our new digital environment, data-centric security is the only viable option for keeping sensitive information safe.
Case Study
CMS Secures Medical Data and Facilitates Partner Compliance
Find out how The Centers for Medicare and Medicaid Services uses PKWARE to protect its data and ensure secure data exchange with hundreds of partner organizations.
eBook
Maintaining Continuous Visibility of Personal Data Across the Enterprise
Data is being shared in the cloud and around the globe in millions of digital channels. Every electronic device—at home, at work, on the go—is constantly transmitting personal information, and companies need to locate and properly label and treat all of it.
Case Study
Global Corporation Secures Data and Meets PCI Compliance Goals
PKWARE’s data-centric approach to security helped one of the world’s largest companies secure millions of unprotected files before a critical compliance audit.
Datasheet
PK Discovery Datasheet
PK Discovery is purpose-built to locate, identify, count, and report all sensitive data, from data repositories and servers—both on-premises and cloud-based—to endpoint files.
Datasheet
PK Privacy Datasheet
Using PKWARE technology to establish and manage your organization's Privacy Operations puts you in full control.
Solution Overview
PK Encryption: Outlook Integration
With PK Encryption, documents, spreadsheets, and other sensitive files remain safe from unauthorized access, even when saved to a message recipient's computer or shared in the cloud.
Solution Overview
Make DLP Processes More Efficient and Effective
PKWARE’s DLP enhancement capabilities integrate with your organization’s existing DLP technology to facilitate scanning of encrypted data, as well as remediation of unprotected data.
Video
PK Masking Overview
Fully utilized data is a company’s most valuable asset – but when it isn’t protected appropriately, it becomes a liability. Watch to learn how PK Masking addresses this with two powerful capabilities, static masking or dynamic masking.
Video
PK Discovery Overview
Watch the video to learn more about how PK Discovery’s powerful machine learning finds information stored on file servers, databases, and endpoint devices, wherever it lives in the enterprise, even if it’s semantically ambiguous.
Video
PK Protect Overview
Watch the PK Protect video to learn more about PKWARE's powerful, automated, and easy-to-use data protection solutions balancing data usage with data protection.
Case Study
Customized Data Masking for ARI Fleet
PKWARE’s value allowed ARI to focus on its core business without massive investments in time and resources, while still accomplishing the critical objectives of protecting sensitive data.
Case Study
Bank Gains Control over Sensitive Data with PKWARE DLP Enhancement
A global bank uses PKWARE technology to solve a complex data security challenge.
eBook
Is Sensitive Data Safe in the Cloud?
Whether you are pondering a move to the cloud, already in the cloud, or expanding to multiple cloud platforms, it’s time to get a true assessment of your risk and learn how to manage sensitive data in the cloud with confidence.
Case Study
Large Enterprise Financial Services Company
This case study of a large enterprise financial services company is based on a December 2020 survey of Dataguise customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Great Eastern Assurance
This case study of Great Eastern Assurance is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
eBook
A Blueprint for CUI Security Compliance
The Department of Defense has rolled out a compliance certification regimeusing a cyber maturity model framework (CMMC). Vendors to the DoD will be required to have a third-party assessment of the company's cyber controls that attest that the company is able to protect controlled unclassified information (CUI) under the CMMC guidelines.
Case Study
State and Local Government #2
This case study of a state and local government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study
Fortune 500 Healthcare Company
This case study of a Fortune 500 healthcare company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
State and Local Government
This case study of a state and local government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study
Small Business Marketing and Advertising Company
This case study of a small business marketing and advertising company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Mission: Cyber, LLC
This case study of Mission: Cyber, LLC is based on an August 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Data Privacy and Protection at a US Healthcare Services Company
The customer's data lake team was in the process of updating their environment to provide subject matter experts access to raw data with context for analytics, yet, being regulated by HIPAA, the first challenge was that to identify a platform-agnostic masking solution for all the PHI and PII.
Case Study
Global 500 Financial Services Co.
This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Global 500 Financial Services Company
This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
Data Privacy and Protection at Global Biotech
This PKWARE customer is a biotechnology company based in California and is dedicated to scientific research and development for medicines to treat people with serious and life-threatening diseases.
Case Study
AWS Customer Snapshot: Financial Services Leader
Digital is redefining the banking industry, as mobile technologies, social media, and the Internet of Things (IoT) are generating unprecedented volumes of data about customers. Financial services firms that are able to harness this data to uncover new business insights and develop the digital tools customers want—even before they know they want them—will be the winners in this new competitive landscape.
Case Study
Todo En La Nube S De Rl De Cv (HQ)
This case study of TODO EN LA NUBE S DE RL DE CV (HQ) is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Hidada
This case study of Hidada is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service.
Case Study
Federal Government
This case study of a federal government is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.
Case Study
Data Privacy, Protection, and Compliance at a Global Medical Equipment and Services Company
This customer had to find a reliable and automated service solution to identify and mask all the personal and sensitive elements in all their growing data reliably. The medical devices worn by users were generating 1-1.5 GB of new data every 10 minutes.
Case Study
Large Enterprise Financial Services Company
This case study of a Global 500 financial services company is based on a December 2020 survey of PKWARE customers by TechValidate, a third-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
Case Study
AWS Customer Snapshot: Miri Infotech
By including PKWARE in 2016 within their suite of services, Miri has been able to uncover vulnerable sensitive data and secure new customers across Healthcare, Financial Services and Education industries, reducing time in Proof of Concepts (POC’s) from weeks to a couple days.