Sitemap
- Products
- Data Protection
- Data Discovery & Classification
- Data at Rest Encryption
- Data at Rest Encryption
- Data Security Platform
- Transparent Encryption
- Encryption for Kubernetes
- Encryption UserSpace
- Application Data Protection
- Tokenization
- Data Protection Gateway
- Database Protection
- Batch Data Transformation | Static Data Masking
- Intelligent Protection
- Selecting the Right Encryption Approach
- Ransomware Protection
- Secrets Management
- Hardware Security Modules
- General Purpose HSMs
- Payment HSMs
- Luna Cloud HSM Services
- Data Protection on Demand
- Services
- How it Works
- Partners
- Pricing
- Sign Up Now
- Network Encryption
- Risk Analytics & Monitoring
- Secure File Sharing
- Application Security
- Identity & Access Management
Capabilities
Identity Types
Product Types
- Request a Demo
- Free Trial: SafeNet Trusted Access
- Solutions
- Solutions Overview
- By Use Case
- 5G Security
- Blockchain
- Data Security & Encryption
- Advanced Persistent Threats (APTs)
- Big Data Security
- Database Security and Encryption
- Docker Encryption
- Encryption for Kubernetes
- Encryption UserSpace
- MongoDB Encryption
- MS SQL Server Encryption
- NoSQL Encryption
- Oracle Database Encryption
- PostgreSQL Database Encryption
- SAP Data Security
- Securing Unstructured Files
- TDE Key Management
- Virtual Environment Security
- Data Sovereignty
- Digital Transformation
- PKI Credential Management
- PKI Middleware
- PKI Authentication
- PKI Security
- Ransomware Solutions
- Remote Workforces Challenges
- Zero Trust Security
- By Compliance
- Americas
- Brazil - LGPD
- CCPA (California Consumer Privacy Act)
- CJIS
- FDA/DEA - EPCS
- FedRamp
- FISMA
- FIPS 199 and FIPS 200
- FIPS 140-2
- FIPS 140-3
- GLBA
- HIPAA
- Mexico - Data Protection Law
- NAIC Insurance Data Security Model Law Compliance
- New York State Cybersecurity Requirements for Financial Services Companies Compliance
- NCUA Regulatory Compliance
- NIST 800-53, Revision 4
- PIPEDA Compliance
- SOX
- STIR/SHAKEN
- APAC
- Australia ASIC Market Integrity Rules
- Australia APRA CPS234
- Australia Privacy Amendment
- Bangladesh ICT Security Guideline
- China Personal Information Security Specification
- Hong Kong Digital Assets Guidelines
- Hong Kong Practice Guide for Cloud Computing Security
- Hong Kong Secure Tertiary Data Backup (STDB) Guideline
- Hong Kong Virtual Asset Trading Platforms Operators Guideline
- India Digital Personal Data Protection Act
- India Framework for Adoption of Cloud Services by SEBI
- India IRDAI ICS Guidelines
- India RBI Outsourcing of IT Services Directions
- Indonesia Personal Data Protection Law
- Japan Act on Protection of Personal Information
- Japan My Number Compliance
- J-Sox
- Korea Personal Information and Information Security Management System (ISMS-P)
- Monetary Authority of Singapore
- Philippines Data Privacy Act of 2012
- Risk Management in Technology (RMiT) Policy
- Singapore MAS Advisory On Quantum
- Singapore Public Sector Data Security
- Singapore CCoP2.0
- South Korea's PIPA
- UIDAI's Aadhaar Number Regulation Compliance
- Vietnam Personal Data Protection Decree