This report is based on a global IDC web-based survey of 1,200 executives with responsibility for or influence over IT and data security. Survey respondents came from nine countries, and represent a range of industries, with a primary emphasis on healthcare, financial services, retail, and federal government organisations. Geographies covered include Australia/New Zealand, the United States, the United Kingdom, Germany, Sweden, the Netherlands, Japan, and India.
On June 28, 2018 governor of California Jerry Brown signed into law Assembly Bill No. 375, the California Consumer Privacy Act (CCPA)1. The CCPA Act, grants to the state’s over 40 million people a range of rights comparable to the rights given to European citizens with the General Data Protection Regulation (GDPR) (the two legislations are not that similar, but they do share some general features, GDPR is an omnibus law, while CCPA is more limited).
Vormetric Transparent Encryption enables organizations to establish strong controls around sensitive data with maximum efficiency. Vormetric Transparent Encryption delivers data-at-rest encryption for structured databases and unstructured files with centralized key management, privileged user access control, and security intelligence to proactively meet compliance reporting requirements. The solution can be deployed without any changes to applications, databases or infrastructure so security organizations can implement encryption with minimal disruption, effort, and cost.
The Thales payShield 9000 HSM is used by the PSP to provide a card scheme certified method for remotely deploying the cryptographic keys required by the Miura Shuttle device for PIN and data encryption and to perform the secure decryption of the payment transaction data prior to onward transmission to the acquirer.
As the operational lifeblood of enterprises, SAP modules range from enterprise resource planning (ERP) to Human Resources (HR), oftentimes containing sensitive data affected by internal governance mandates or external regulations. Explore the challenges for securing SAP data and the various technology approaches and their tradeoffs.
Vormetric Application Encryption White Paper
Vormetric Application Encryption is typically employed when compliance or regulatory mandates require encryption of specific data or database fields at the application, before data is stored. Vormetric Application Encryption reduces the complexity and costs associated with meeting this requirement. Developers can use either RESTful API’s or libraries for Java, .NET and C to create key management and data encryption applications based on the PKCS#11 standard.
Secure, Flexible and Efficient Key Management for Payment HSMs
The Thales eSecurity Key Management Device (KMD) for payment HSMs is a compact tamper-resistant security module (TRSM) that enables keys to be formed securely from separate components in a manner that is compliant with relevant security standards including X9 TR-39, ANSI X9.24-1 and PCI PIN Security.
In this second of a two-part series, 451 Research continues its analysis of the retail payments value chain by exploring five additional payment trends expected to make their mark within the payments industry over the coming months. These include the increasing threat to financial institutions from fintech companies, the growing need for significant infrastructure investment from the incumbents and the expanding use cases for tokenization beyond digital wallets.
In this first of a two-part report series, 451 Research provides a recap of key events that made an impact on the payments industry in 2018 – from major M&A announcements to new regulations and industry standards. The report then explores the top five payment trends they expect to shape payments in 2019 – from mobility and integrated payment strategies to the role of machine learning in the value chain.
As security teams struggle to contend with more frequent, costly, and sophisticated attacks, data-at-rest encryption becomes an increasingly critical safeguard. This white paper offers an overview of the different encryption approaches available today.