A Security Practitioner’s Guide to the Cloud- Maintain Trust and Control in Virtualized Environments with SafeNet’s Trusted Cloud Fabric
Achieving Data Privacy in the Enterprise
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Environment
Safe netauthenticationmanager migrationbundles_pb_(en)_web(1)
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Man-in-the-Browser Security Guide
Enhancing the Security of Full Disk Encryption Solutions with Pre- Boot Authentication Security Guide
A Single Strong Authentication Platform for Cloud and On-Premise Applications
Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?
Securing Communications in the Cloud Security Guide
Securing Cloud Storage Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security
Reducing PCI Compliance Costs and Effort with SafeNet Transparent Tokenization
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authentication Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
ProtectV - Data Security for the Cloud
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft Windows
Complying with the Payment Card Industry Data Security Standard