Product Resources


PKWARE redefines enterprise data protection, providing complete administrative control while finding and protecting sensitive data on user devices, file servers, mainframes, and more, on every enterprise operating system.

Read PDF

PKWARE Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers, ensuring compliance with a wide range of regulatory requirements and customer privacy mandates. TDE secures file and application data without application changes, additional infrastructure or professional services.

Read PDF

The PKWARE Enterprise Manager is the central component of the Smartcrypt platform, allowing organizations to implement enterprise-wide encryption policies and maintain control over all encryption activity.

Read PDF

Smartcrypt is the most flexible and powerful IBM Z encryption solution available. Smartcrypt protects both structured and unstructured data, gives customers the option to embed encryption directly into their applications, and can secure mainframe databases with field-level, length-preserving encryption.

Read PDF

PKWARE's software development kit is the ideal solution for organizations who need to incorporate strong encryption into their products or systems. PKWARE delivers high performance, cross-platform security that is easily embedded, insulating sensitive data from weaknesses in other systems that may handle the information.

Read PDF

Get the details on how PKWARE uses pattern recognition, dictionaries, and other tools to scan documents for sensitive data, while minimizing the possibility of false positives and false negatives.

Read PDF

A closer look at PKWARE's plugin for Microsoft Outlook, including configuration options and details on outgoing and incoming email workflows.

Read PDF

Whitepapers


This paper provides a methodology for protecting CUI that is easy and cost-effective for an organization to implement and will satisfy the CMMC maturity requirements of a company’s DoD contracts. This CUI-centric data protection methodology assures that CUI data can only be accessed by employees and sub-contractors that have appropriate clearance, or program authorization from the government.

Read PDF

Even though perimeter and network security have failed time and time again to secure data, few organizations understand how to properly implement data-centric security. This paper defines data-centric security, and provides not only an overview of its key principles, but also best practices for designing and implementing an effective solution.

Read PDF

As data volumes continue to increase and cyber threats grow harder to predict, data classification has emerged as an essential element of data-centric security.

Read PDF

When organizations can simultaneously identify and encrypt sensitive information on file servers and user devices, they gain unprecedented control and visibility over their data, eliminating the obstacles to true enterprise information security.

Read PDF

Each time an organization sends sensitive data outside its own network, it exposes itself to risks. PKWARE facilitates policy-based secure data exchange, without security gaps and without disrupting user workflows.

Read PDF

Recent high-profile data breaches have demonstrated beyond question that network and device protection is not enough. True information security requires persistent data level protection, so that files and folders remain secure even after they leave a company’s systems.

Read PDF

The EU’s new General Data Protection Regulation brings fundamental change to the ways businesses and other organizations collect, store, and use personal information.

Read PDF

The strength of any cryptosystem depends in large part on the unpredictability of the data used in the encryption process. Unfortunately, some of today’s most commonly-used sources of “random” data depend on inputs that have the potential to inject predictable data, and therefore weakness, into the process.

Read PDF

New York’s 23 NYCRR 500, a set of cybersecurity mandates and recommendations for the financial services industry, took effect on March 1, 2017. The law is the first of its kind in the United States and represents an early step in what may become a nationwide movement to improve data security through increased regulation.

Read PDF

Case Studies


See how one global company is using PKWARE 's data redaction technology to ensure PCI DSS compliance.

Read PDF

The Centers for Medicare & Medicaid Services (CMS) is responsible for safeguarding sensitive patient data, and also secures information exchanged between hundreds of partners at the federal and state level, as well as with universities and private businesses.

Read PDF

A major healthcare software provider, despite its industry-leading reputation, recently found itself under pressure to enhance its data security capabilities. Many of the company’s largest customers had begun to request that it build strong encryption into its Electronic Health Records (EHR) software.

Read PDF

See how a major insurance company met customer demands for PCI-compliant encryption while securing its internal data against cyber threats with PKWARE's transparent data encryption.

Read PDF

Learn how a fast-growing online education company met customer expectations for encrypting data at rest while laying a strong foundation for long-term data protection.

Read PDF

In one of the country’s largest cities, a government agency faced a series of challenges as it struggled to manage a rapidly increasing volume of secure data traffic.

Read PDF

A high-profile federal government agency, tasked with ensuring the safety of millions of travelers each day, recently found that its data security policies had several significant weaknesses.

Read PDF

Solution Sheets by Mandate


Companies can use PKWARE to meet a variety of NIST 800-171 standards and achieve the desired CMMC maturity level. Our solutions can be used to address requirements for data classification, data protection, encryption key management, and activity logging.

Read PDF

The General Data Protection Regulation (GDPR) is a new cybersecurity law that will take effect in the European Union in May 2018. The law introduces both new rights for EU citizens and new obligations for companies that collect, use, or process the personal information of EU citizens.

Read PDF

PKWARE addresses the standards outlined in FIPS 140-2 by strongly encrypting the data itself. PKWARE's FIPS mode setting ensures only FIPS 140-2 validated cryptography is used and it avoids the need for setting disruptive operating system FIPS policy settings.

Read PDF

To improve the efficiency and effectiveness of the healthcare industry, vast amounts of patient information are being handled electronically. Therefore, there is an increased need for stronger data security.

Read PDF

PKWARE’s automated data redaction technology removes credit card numbers from files based on organizational policy. Redaction takes data out of scope for PCI requirements, and ensures that cardholder data will not be exposed in the event of a computer theft or other security event.

Read PDF

With PKWARE, financial services organizations and their service providers can improve data security while ensuring compliance with NYCRR 500 mandates.

Read PDF

PKWARE’s data-centric approach is aligned with the goals and strategies of the CDM program, and provides the capabilities government departments and agencies require in order to meet their data protection objectives.

Read PDF

Solution Sheets by Use Case


As more organizations adopt end-to-end encryption solutions, their DLP processes and technology have become less effective. PKWARE can integrate company-controlled encryption into DLP worlflows, improving security and performance.

Read PDF

Smartcrypt's automated data protection workflow is ideal for encrypting surveillance footage and other video files that contain sensitive information.

Read PDF

Email communication creates multiple opportunities for sensitive data to be misdirected or intercepted. Find out how PKWARE keeps email messages safe from internal and external threats.

Read PDF

PKWARE provides seamless key management in order to avoid direct user access to keys, key-rings, and public/private key files, etc. It allows encryption to be managed on an owner/recipient level, which avoids common key sharing and access issues.

Read PDF

Every organization needs to share sensitive information with external companies and individuals. As data volumes and data traffic continue to increase, data exchange becomes a greater necessity and a greater risk each year.

Read PDF

Smartcrypt is the most flexible, high-performance z Systems encryption solution available today.

Read PDF