IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

www.voltage.comVoltage Customer Success Story - Regional Air Carrier

A growing regional air carrier needed a way to protect its customer data and achieve compliance at both level-1 and level-2 classifications. The Voltage Security solution combines the following technologies to deliver a simple and cost-effective solution across the entire company: Voltage Secure Stateless Tokenization (SST) technology, Voltage Format-Preserving Encryption (FPE), and Voltage Page-Integrated Encryption (PIE).


VoltageMeeting Data Residency and Compliance Challenges in Global Enterprises

In today's global business environment, companies are increasingly finding their employees, business practices, and IT systems stretched across international boundaries. However, one element of a global enterprise remains surprisingly local: how to effectively manage data residency requirements and data privacy regulations.


VoltageAchieving PCI DSS 2.0 Compliance with Voltage Security

The Payment Card Industry (PCI) Data Security Standard (DSS) 2.01 dictates that organizations processing and storing credit card data just comply with a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with PCI DSS 2.0 can be expensive, challenging, time-consuming, and disruptive, as cardholder data is often stored, transmitted, and used in many different applications within an organization, sometimes even beyond the organization's IT firewalls.


CatbirdCatbird vSecurity

Catbird vSecurity is an integrated network security solution purpose-built for virtualized infrastructure with continuous monitoring, automated enforcement, and real-time proof of compliance capabilities that accelerate virtualization and dramatically increase operational efficiencies.


CatbirdCatbird VMware Forsythe PCI DSS Solution Guide

As a member of the VMware Partner Network, Catbird published this addendum to the VMware Solution Guide for PCI DSS. Forsythe, a QSA, has confirmed that Catbird control elements are in line with PCI Guidance. Catbird vSecurity enables continuous policy monitoring and automated enforcement for the PCI DSS framework.


CatbirdPCI Compliance and Virtual Asset Management

Co-sponsored by Catbird and VigiTrust, this paper addresses overcoming the challenges of scoping for Cardholder Data, including scope management, assessment preparation, continuous compliance considerations, operation impacts and do's and don'ts of virtualization security.


Online TechDisaster Recovery

Investing in risk management means investing in business sustainability – designing a comprehensive business continuity and disaster recovery plan is about analyzing the impact of a business interruption on revenue.


Voltage SecurityStreamlining Information Protection Through a Data-centric Security Approach

This document introduces a unique approach from Voltage Security that combines data encryption and masking technology in one, which can vastly simplify data privacy, whilemitigating data leakage at a fraction of the cost of prior approaches. One fundamental technology is Voltage Security's Format-Preserving Encryption (FPE), which for the first time, allows encryption 'in place' in databases and applications, without significant IT impact.


Voltage SecurityEnd-to-end Data Protection for the Way Your Business Works

Voltage SecureData Enterprise brings a unique, proven data-centric approach to protection – where the access policy travels with the data itself – by permitting data encryption and tokenization without changes to data format or integrity, and eliminating the cost and complexity of issuing and managing certificates and symmetric keys.


Voltage SecurityAchieving PCI Compliance at Greatly Reduced Cost

The global financial services company has a major credit card processing business. Like other credit card companies, it is imperative that they comply fully with the PCI DSS standards and procedures. Before Voltage Security, they were engaged in a security and compliance program costing tens of millions of dollars.


Online Tech

PCI Compliant Hosting

Engaging customers online is a necessity for every business today. Brick and mortar traditional retail shopping experiences compete aggressively with online buying experiences, with local customers often choosing to buy online even if the store is right down the street. Key banking and bill processing transactions are only a mobile app away, making both e-commerce transactions and the the number of end points touching cardholder data prolific. Established companies have to become online and mobile before the younger, nimbler competition absconds with the mobile market share. Nascent startups have to provide mature transaction security to protect their reputation with customers, and access to credit lines.


Online TechEncryption of Cloud Data

Organizations seeking to protect sensitive and mission-critical data quickly realize that there is no single answer to keep all systems completely secure. Online data security is a complex, rapidly evolving landscape, requiring robust and layered protections. Encryption is one tool in a comprehensive defense-in-depth strategy to mitigate the risk of accidental and intentional data breaches.


Voltage Corporate Solution BriefVoltage Security Corporate Solution Brief

Voltage Security delivers a secure, scalable and proven data protection solution that seamlessly protects all the key data that is critically linked to every facet of the business. Leveraging breakthrough encryption technologies, our powerful data protection solutions allow any company to seamlessly secure all types of sensitive data.


Voltage Big Data White PaperWhite Paper: Big Data, Meet Enterprise Security

Large organizations worldwide are working to develop and deploy Big Data analytical facilities alongside their established business intelligence infrastructure. These initiatives are motivated in nearly equal parts by the conviction that new business insights and opportunities are buried in the avalanche of new data, by the knowledge that conventional business intelligence systems are unequal to the task, and by the fear that competitors will be first to master and exploit the available new data streams.

Page 3 of 23

  Most Popular | All