Data Security Software protects sensitive data for small businesses.
Designed for environments with 10-150 users, PGP-® Whole Disk Encryption Workgroup Edition protects data on laptops, desktops, and USB devices so users can maintain compliance. Program is comprised of PGP-® Whole Disk Encryption Controller management application for Microsoft-® Windows, which can run without any additional servers or databases, and PGP-® Whole Disk Encryption client software.
Read More »Hardware Security Module features PIN mailer capabilities.
Enabling users to securely output basic and enhanced PIN mailers to attached printer, FIPS 140-2 Level 3, network-attached HSM, PrivateServer v4.6 provides cryptographic services in wide range of environments and applications such as EMV, Visa 3-D Secure, electronic finds transfer, and PIN verification along with transaction signing, hashing, and encrypting. Product also supports new EMV...
Read More »Encryption Appliance provides security for backup tapes.
Available with user-selectable AES-128 or AES-256 encryption modes, Q3 Enterprise Appliance supports up to 4 tape drives. Unit comes in SCSI and Fibre models with encrypted throughput of 300 MB/sec and interface speeds of 320 Mb/sec on SCSI and 4 Gb/sec on Fibre Channel. For optimal security, non-intrusive appliance includes hardware encryption chip that is unique to each customer.
Read More »Portable USB Device enables secure access and transactions.
When connected to any free USB port and used with smart card technology, @MAXX(TM) prime can provide strong authentication for access to PCs and networks as well as digital signature and encryption tools. It can also provide secure PIN protection for accessing on-board portable flash data storage. In addition to contact/contactless smart card functionality, solution combines fixed and expandable...
Read More »
Choosing the Best Industrial Facial PPE Supplier: 5 Key Factors
Paulson is an industry leader in PPE production, most notably face and eye protection. Learn more now about what factors are most important to consider when choosing a PPE supplier.
Read More »Hardware Security Modules are FIPS-approved.
Certified for Microsoft Windows Server 2008 and interoperable with Java applications, Hardware Security Modules enable organizations to deploy encryption for enterprise applications. nShield-® and netHSM(TM) meet requirements for commercial and custom-built business applications employing encryption. nCipher v11 unifies functionality available across all nCipher modules, and offers support for...
Read More »Encryption Switch/Blade protect digital data center assets.
Stand-alone Brocade Encryption Switch or Brocade FS8-18 Encryption Blade for Brocade DCX-® Backbone chassis provide up to 96 Gbps encryption processing power and scale to meet data security demands. While Brocade Encryption Switch consists of 32-port, auto-sensing, 8 Gbps Fibre Channel switch with high-speed encryption, Brocade FS8-18 Encryption Blade provides same plug-in storage security...
Read More »Flexible Card-Shaped Authenticator secures online banking.
Generating password when front button is pressed, RSA SecurID-® Display Card is event-based, one-time password authenticator that helps financial institutions and their customers secure online accounts and transactions with 2-factor authentication. Unit is powered by RSA-® Authentication Manager v7.1 and RSA SecurID Authentication Engine. It meets regulations and guidelines in Latin America,...
Read More »Managed Services help businesses secure email and data.
AT&T Encryption Services(SM) help protect companies from data loss and leakage while also addressing regulatory compliance concerns, non-repudiation of data, and privacy issues. Focused on protecting information by providing encryption services and management of digital signatures in the cloud, capabilities include enterprise policy-management filter, email confidentiality, email sender...
Read More »Software protects data on smartphones.
Available for Windows Mobile devices, PGP-® Mobile encrypts data automatically without impacting device performance. Program can encrypt individual files, entire data volumes, archives, or directories. As part of PGP Encryption Platform, PGP Mobile leverages integrated key management and automatic provisioning, and enables users to share encrypted data with other mobile and desktop users....
Read More »
New GEM X(TM) Software Remotely Manages General Dynamics' HAIPE® IS-Compliant Encryptors
GEM X enables efficient management of up to 500 HAIPE IS version 1.3.5 TACLANE encryptors. Product Name: GEM X(TM) Encryptor Manager Web address: www.gdc4s.com/GEMX The new GEM X software application enables network administrators to remotely monitor and control up to 500 HAIPE IS version 1.3.5 TACLANE-® encryptors from a central location. With an improved, more intuitive user interface, GEM X...
Read More »
Innovative Dampney Coating Systems Suit Even the Most Specialized Applications
Dampney's high performance coating systems provide protection against extreme weather, chemicals, and corrosive environments for atmospheric, immersion, and underground applications. Check out the video to learn more.
Read More »