With more than thirty years of experience in data protection, PKWARE has earned a reputation for developing high-performance technology that solves challenges no other vendors can address. Industry analysts continue to recognize PKWARE as a leading provider of data protection solutions.
Aite
Refresh Your PCI Compliance With Automated Data Redaction
PCI regulations have impacted companies throughout the decades. This report from the Aite Group discusses how affected organizations now have a unique opportunity to refresh their PCI strategies, reduce PCI scope, and unlock the value of cardholder data.
Read ReportAberdeen
Three Short Takes on Successful Data Protection Initiatives
Every enterprise has initiatives in place to provide some level of protection for its valuable or regulated data. Aberdeen's Derek Brink provides three "short takes" on why they’re needed, and what helps them to be more successful.
Read Report451 Research
Encryption vendor PKWARE adds data redaction to address PCI requirements
The company's most recent update is the addition of sensitive-data-redaction functionality to address PCI compliance use cases, specifically for credit card issuers and payment processors looking to prevent leaking of credit card numbers into unstructured data.
Read ReportGartner Research
Hype Cycle for Data Management
This report will help data and analytics leaders interested in data management solutions to understand the evolutionary pace of maturing and emerging data management technologies.
Purchase ReportGartner Research
Hype Cycle for Data Security
Data is a pervasive asset crossing traditional boundaries on-premises and in cloud services. Every digital business opportunity needs a data-centric security strategy to prioritize the mitigation of growing business risks caused by data protection and privacy laws, hacking, fraud, and ransomware.
Purchase ReportGartner Research
Hype Cycle for Application Security
Today’s pace of application development is continuously accelerating, giving way to complex, interconnected software systems. Security leaders need to adopt innovations in the application security space to handle the growing complexity.
Purchase ReportGartner Research
Hype Cycle for Privacy
Security and risk management leaders treating technology, information and resilience risk must place privacy as a top three priority. Laws and privacy-preserving technologies that protect business value and brand image are covered in depth, allowing prioritization of risk and investment.
Purchase ReportGartner Research
Hype Cycle for Threat-Facing Technologies
Threat-facing technologies aim to defend IT systems and applications from attacks through prevention, detection and effective response. Technologies and services included meet the security needs of end users who employ cloud and on-premises IT threatened by the evolving threat landscape.
Purchase ReportGartner Research
Hype Cycle for Cloud Security
This Hype Cycle encompasses technologies and standards that improve the security, governance and reliability of private and public cloud computing.
Purchase ReportForrester
The Forrester Tech Tide: Data Security And Privacy
Data security and privacy is critical to firms' ability to win, serve, and retain their customers. To protect sensitive data, meet compliance, and continue to mature their practices for data security and privacy, companies are evaluating and adopting a range of contributing technologies.
Purchase ReportNucleus Research
PKWARE Delivers Secure Enterprise Encryption
The business value of persistent data security can be measured with increased efficiencies, reduction of errors from manual migration of data, and secure risk management.
Read ReportAberdeen Group
Encryption Alone Is Not Enough: What Makes Your Data Protection Initiative Successful?
Organizations who are thinking about data protection initiatives are overwhelmingly focused on technical controls, while paying much less attention to business context and risk. Successful enterprise data protection initiatives incorporate technology thoughtfully into the data's lifecycle and workflows.
Read ReportIDC
IDC Market Glance: Data Privacy Tools and Management
This IDC Market Glance provides an overview of the landscape of data privacy tools and management solutions. These tools and segments assist with compliance with various data privacy regulations around the globe.
Purchase ReportIDC
Worldwide Corporate Endpoint Security Forecast
This IDC study presents a five-year forecast for the worldwide endpoint security market as of June 2018, using estimates of market actuals from calendar year 2017.
Purchase ReportIDC
Worldwide Endpoint Encryption Forecast
This IDC study provides a forecast by revenue for the worldwide endpoint encryption market. The forecast data addresses the file and folder encryption and the full disk encryption markets.
Purchase Report451 Research
Finders, keepers: PKWARE updates Smartcrypt with sensitive-data discovery
PKWARE has updated the transparent encryption capabilities of Smartcrypt with sensitive-data discovery in an effort to help companies be more discriminate about how and where they use encryption; in other words, making Smartcrypt smarter.
Purchase Report451 Research
PKWARE Looks to Ease the Pain of Application Encryption with Smartcrypt
The company’s new Smartcrypt attempts to provide the best of both worlds, with application-level encryption that eliminates the usual complexity of doing encryption and key management higher up the stack – or ‘PKI minus the headache.’
Purchase Report