+1.800.357.1019

+1.800.357.1019

Feel free to call us toll free at +1.800.357.1019.

If you are in the area you can reach us at +1.360.359.4400.

Standard support
6:30am - 4:00pm PST, Monday - Friday, Free

Premium support
If you own Townsend Security 24x7 support and
have a production down issue outside normal
business hours, please call +1.800.349.0711
and the on-call person will be notified.

International customers, please dial +1.757.278.1926.

Townsend Security Data Privacy Blog

Microsoft SQL Server Automatic Encryption - Cell Level Encryption

Microsoft SQL Server Automatic Encryption - Transparent Data Encryption

Microsoft SQL Server Encryption - An Introduction

Three Core Concepts from "Zero Trust" to Implement Today

The Future of Active Security Monitoring on the IBM i

Fixing the TDE Key Management Problem in Microsoft SQL Server

OpenSSH on the IBM i and Your Security

New York Department of Financial Services (NYDFS) and Encryption - 8 Things to Do Now

IBM i Security Architecture & Active Monitoring

Townsend Security Announces Major Update to Alliance LogAgent for IBM i

Dangers of Encryption on the IBM i (AS/400, iSeries): Avoid These Pitfalls

IBM i Security Notification - OpenSSL and OpenVPN

IBM i Security: Auditing Privileged Users, Applications, and Database Files

New York Financial Regulations and the CISO. Oh My.

IBM i FieldProc Architecture and Implementation

New York, Financial Institutions, and IBM i Encryption

System Logging for the IBM i - A Must Have Security Control

The IBM i, OpenSSL and Security Patching

Creating the IBM Security Audit Journal QAUDJRN

IBM i Security: Event Logging & Active Monitoring

Privately Held Companies Think They Don’t Need to Worry About Security and Compliance

How Do I Find and Start Alliance Key Manager for Encryption Key Management in AWS?

Encrypted Indexes - Overcoming Limitation with FieldProc Encryption on the IBM i

How Do I Encrypt Data and Manage Encryption Keys Using Java in Amazon Web Services (AWS)?

How Can I Manage and Monitor Alliance Key Manager in Amazon Web Services (AWS)?

IBM i, PCI DSS 3.2, and Multi-Factor Authentication

How Can I Be Sure I Never Lose My Encryption Keys in Amazon Web Services (AWS)?

Managed FTP Services on the IBM i – Look for These 8 Features

Who Has Access to My Encryption Keys in Amazon Web Services (AWS)?

IBM SoftLayer, VMware and Getting to the Secure Cloud

Encryption & Key Management for the IBM i

Encryption & Key Management for SQL Server

When Encrypting Databases, Does Key Connection for SQL Server Cache the Encryption Key?

Top 10 Signs Your Encryption Strategy May Have a Problem

IBM, Quantum Computing and Encryption

Phillip Rogaway Said Something Important

Encryption Performance on the IBM i

Secure and Managed FTP on the IBM i (AS400) Platform

Key Management: The Hardest Part of Encryption

Speaking Words of Wisdom, Let it Key

Encryption Key Management & Your IT Strategy

Ransomware and Why You Need Off-Site, Disconnected Backup

How Attorneys Think About Credit Card Data Breaches

Why You Should be Continuously Delivering Drupal Updates - All the Time

MongoDB and Encryption Key Management for Compliance

What Does the EU General Data Protection Regulation (GDPR) Mean to You?

PCI DSS 3.2 and Two Factor Authentication (2FA)

Key Management Systems Integration & Management Remain a Challenge

Getting Funding for Your Security Project: A Guide for the CISO

2016 Encryption Key Management: Industry Trends & Perspectives

Linux and Encryption and Key Management! Oh My!

Does HIPAA Require Encryption of Patient Information (ePHI)?

Gnu Privacy Guard (GPG) and PGP Command Line Compatibility

The Dichotomy of Current IT Challenges Around Encryption

Encryption and Key Management for MySQL Developers

IBM System z Mainframe and Audit Logging

A Data-centric Approach to Securing Sensitive Data

The California Attorney General Just Changed How We Will Think About Data Security

Apple and the FBI - I'm with Tim Cook

Mainframe Myth-Busting: File Integrity Monitoring is Only for Windows/UNIX Security Systems

How System Logging and Snowstorms Can Provide Important Information

AES Encryption Performance on the IBM i (AS/400, iSeries):

FAQ: IBM i System Logging for IBM Security QRadar

The Boyd Gaming Case Study of LogAgent for IBM QRadar

Congratulations on taking the first step with IBM QRadar!

IBM i Access for Windows 7.1 Security Update Announcement

To Key or Not to Key: That is the Question

Looking Back on 2015 Data Breaches

Fixing Encryption Key Management Audit Failures in Microsoft Windows C# Applications

Securing your IBM i (AS/400, iSeries) - Webinar Q&A

State of Encryption Key Management

Monitoring IBM i Logs with IBM QRadar - Improve Your Security

How Does LogAgent Send Security Information? Is Information Batched?

How Much Disk Storage Does Alliance LogAgent Use?

EU Data Privacy, Safe Harbour and Encryption

Can I Encrypt Key Fields (Indexes) with IBM i FieldProc?

How Does Data Masking Work with FieldProc Automatic Encryption

How Does IBM i FieldProc Encryption Affect Performance?

What are the New IBM i Security Audit Journal Events for V7R2?

Encryption & Key Management in Microsoft SQL Server

Does Alliance Key Manager Support Rolling Keys and How Does it Work?

FIELDPROC Encryption and Backup Protection

PCI DSS Requirements 3

Which IBM i User Gets to My Log Collection Server and SIEM?

How Many Encryption Keys Should I Create to Protect My Data?

Configuring the IBM i to Collect Security Events

How Much Data Does Alliance LogAgent Send to My SIEM?

Encryption and Key Management – “Bring Your Own” to the Cloud

How Secure Is Your Data in Drupal? (And 5 Essential Security Tips)

It Takes a Creative Mind to Stop a Devious Mind

Reflections on COMMON Annual Meeting and Exposition 2015

Basics of Keeping Data Safe in the Cloud

Three Things to Know about PGP Encryption & the IBM z

Introducing Key Connection for Encryptionizer

Overcome Security Challenges with Your VMware Environment

Understanding Encryption and Key Management for VMware

Basics of the EU Data Protection Working Party

Data Protection in the Cloud & PCI DSS - Logs and Log Monitoring (Part 3)

Understanding the Challenges of Data Protection in AWS

Data Protection in the Cloud & PCI DSS - Segmentation (Part 2)

Data Protection in the Cloud & PCI DSS - Encryption and Key Management (Part 1)

Is Drupal Ready for the Enterprise?

Anthem Data Breach - We Are Taking the Wrong Lesson About Encryption

VMware Encryption - 9 Components of a Defensible Encryption Strategy

PGP on IBM System z Mainframes

Securing Web Sites and Applications with Encryption & Key Management

Notable Data Security Breaches of 2014

Our Top 10 Most Popular Data Security Blog Posts of 2014

Securing Alliance Key Manager for VMware

Securing SQL Server in the Cloud

VMware and SQL Server Encryption

Encryption and Key Management for VMware®

PCI Compliance and the Assessment Process

VMware and SQL Server Encryption – We Can Do That

Being Thankful Every Day for Data Security!

Encrypting Data in the Cloud: How a CEO Can Manage Data Security Risk

Data breaches are often avoidable...

Why is Encryption & Key Management So Important?

So, What is Encryption & Key Management Anyway?

XML, Web Services, and Encryption

Encryption Key Management in SQL Server

Get to Know Microsoft SQL Server Data Security Options

Making a Case for Two Factor Authentication

The Most Frightening Data Breaches of 2014… So Far!

Kudos to Tim Cook and Apple Computer

Protecting Sensitive Data in Amazon Web Services

5 Ways CEOs Can Limit Liability, Manage Risk with Encryption

Three Cyber Crimes That Can Cripple You, and How to Prevent Them

Homomorphic Encryption is Cool, and You Should NOT Use It

Why Encrypt Data in Your Drupal Websites?

Are You Turning a Blind Eye to Data Security in Your Business?

Want to Get Bigger Clients? Give Them Encryption & They Will Come

How To Meet PCI DSS Compliance With VMware

What You Need To Know About Encryption & EU Data Privacy Protections!

Overcome the Top 5 Fears of Encryption & Key Management

SlimTrader Says: "Alliance Key Manager is a Godsend!"

Volunteer & Community Giving Initiatives at Townsend Security

What are the Differences Between DES and AES Encryption?

5 Reasons to Join Townsend Security’s Drupal Developer Program

Encrypting Data In Amazon Web Services (AWS)

Encryption Options for Microsoft SQL Server

Encryption & Key Management for Amazon Web Services (AWS)

Overcoming the Top 4 Fears of Encryption and Key Management

Critical Steps to Encryption & Key Management in the Azure Cloud [White Paper]

Encryption: Do I Need Key Storage or Key Management?

Two Factor Authentication: A Step to Take for Better IBM i Security

Encrypting Data with .NET Libraries

Two Factor Authentication: Secure and Strengthen Access to your IBM i

What Data Needs To Be Encrypted In Drupal?

Nine Guidelines for Choosing a Secure Cloud Provider

GLBA/FFIEC Compliance = Encryption & Key Management

PCI DSS Compliance = Encryption & Key Management

Data Security: 10 Things to Consider When Moving to the Cloud

IBM i System Logging – QHST Messages

3 Ways Encryption & Key Management Can Help You Sleep

Townsend Security Launches Developer Program for Drupal

Actively Monitoring Your IBM i for Security and Compliance

System Logging and Compliance Regulations

Drupal CMS and Higher Education Compliance

IBM i System Logging – System Operator (QSYSOPR) Messages

3 Ways Encryption Can Improve Your Bottom Line

Two Factor Authentication (2FA) on the IBM i

Target CEO Resigns Over Data Breach - Is Your Job at Risk?

Drupal CMS and GLBA/FFIEC Compliance

New eBook: The Encryption Guide

Your IBM i May Have a Heartbleed Issue After All

Cloud Resellers: Meeting Customer Concerns About Data Security in Azure, AWS, and Other Clouds

Drupal CMS and Changes in HIPAA/HITECH Regulatory Compliance

Heartbleed and the IBM i (AS/400)

Heartbleed Vulnerability and Townsend Security Products

Drupal CMS and PCI DSS Compliance

Authentication Called For By PCI DSS, HIPAA/HITECH, and GLBA/FFIEC

Three Features That Enable Easier Encryption & Key Management

Encryption & Key Management Everywhere - Webinar Q&A

Encryption & Key Management Everywhere You Need It

Never Lose an Encryption Key in Windows Azure

5 Common FAQs About IBM i Encryption Using FIELDPROC

Five Things About Alliance LogAgent You May Not Know

University Websites Built on Drupal Should Encrypt Sensitive Data

Key Connection - The First Drupal Encryption Key Management Module

Top 5 FAQs About PGP File Encryption Answered

Encryption & Key Management in Windows Azure

Welcome to Windows Azure Encryption Key Management

Two Factor Authentication on the IBM i - Webinar Q & A Recap

Defeat Unauthorized Access with Two Factor Authentication

The Target Data Breach: Could Two Factor Authentication Have Prevented It?

Virtual Encryption Key Management - 5 Things to Look For

7 Reasons Why Using VMware Makes Key Management Easier Than Ever

Introducing Alliance Two Factor Authentication for the IBM i

Encryption Key Management Options: Hardware, Virtualized, and Cloud… Oh My!

Data Security New Years Resolution

What You Need to Know About PCI DSS v3.0

Encryption & Key Management & System Logging & Data Security & Partnerships

Would You Pass a Data Security Audit? - Part 2 - Q&A

Traditional Encryption Key Retrieval vs. On-Board Encryption?

Would Your Data Security Strategy Pass an Audit?

Vimeo, Evernote Take Action after Adobe Data Breach

The Importance of Computer Programming Education!

Encryption Key Management - Any Way You Want It…

Why Partner With Townsend Security?

Q&A: Secure Managed File Transfer and PGP Encryption

Secure Managed File Transfer and PGP Encryption

Encryption & Key Management with Microsoft SQL Server

Hotels and Hospitality ISVs Can Do More to Prevent Data Breaches

Encryption Key Management in the Cloud

The Benefits of Encryption and Key Management Done Right!

Managed Single Sign-On Services – A Clear Return on Investment (ROI)

Encryption Key Management Guidelines- How to do Encryption Right!

Encryption Key Management HSMs in the Cloud

Keys ARE the Key to Effective Encryption

PASS Summit 2013 - We’ll Be There! Will You?

3 Critical Best Practices for Encryption Key Management on the IBM i

NSA Influenced Encryption Algorithms

Signs Your IBM i May Have Been Hacked - part 2

Must-Haves in an Encryption Key Manager

Signs Your IBM i May Have Been Hacked!

Encryption Key Management Best Practices for Executives

Secure Managed File Transfer on the IBM i webinar - Part 2

Property Management Systems Need Stronger Encryption Key Management

What is Social Engineering? Know the Signs and how to Prevent Attacks

Securing Data in Motion with PGP Encryption

Affordable Encryption Key Management?

Virtualized Encryption and Cloud Security…

Secure Managed File Transfer on the IBM i - Part 1

Gambling with Data: Gaming Industry Must Protect Credit Cards

5 Critical Features to Look for in a VMware Encryption Key Manager

Industry Must-Haves for Effective Encryption Key Management

MySQL and Encryption Key Management

Encryption Key Management for VMware’s vCloud

SSWUG is Someone You Should Know

Understanding System Logging on the IBM i – Part 2 – Webinar Q&A

VMware and PCI DSS Compliance

Simplified Encryption Key Management in Virtual Environments

Payment Applications Can Secure Data Breaches with Key Management

What is Encryption Key Management?

Understanding Log Management on the IBM i: Part 1

How Do You Plan to Overcome Critical Security Issues?

AES vs PGP: What is the Difference?

3 Ways An Encryption Key Management Partner Will Make Your Life Easier

Three IBM i (AS400) Security Tips You Need to Know

Data Gets Out. Encrypt It!

PCI Encryption - Three Things to Know & Three Things to Protect

PGP Encryption 101: Should I Give My Trading Partner My Private Key?

Three Most FAQs About Encryption Key Management on the IBM i

Encryption Key Management Overview using Microsoft SQL Server

3 Reasons Retail ISVs Should Use OEM Encryption Key Management

The Right Data Security Partner Can Make a Difference!

Top 3 POS Security Issues Executives Should Be An Expert On

3 Advantages of OEM Encryption Key Management for POS Vendors

SQL Server Data Protection: Setting Up TDE or Cell Level Encryption

Data Protection - Who Knows Where Your Keys Are Hidden?

3 Reasons Point of Sale (POS) Vendors Should Offer Encryption Key Management

4 Things a Point of Sale (POS) Vendor Can Do to Avoid a Data Breach

4 Ways to Get Password Hashing Right

Steps to Take to Reduce Security Risk

SQL Server Encryption: Three “Key” Things to Remember…

4 Ways to Encrypt Data in Microsoft SQL Server

How LivingSocial Could Have Avoided a Data Breach

IBM i Security: FIELDPROC, Encryption Key Management, and Compliance

Merchants Who Passed PCI-DSS Audit Last Year May Fail Next Time

What the CEO Needs to Know About Data Security

Should Solution Providers Offer Encryption Key Management?

Help! Do I Upgrade My IBM i or My Software First?

Secure SharePoint with Remote Blob Storage (RBS) Encryption

Exposed and We Know It - Don’t Wait Around for a Data Breach!

(The Cost of) the CEO/CISO Disconnect

Top 5 Barriers to Good Encryption Key Management

Did I Do That? Many Data Breaches are Caused by Employee Mistakes

Information Security is Up to You

Protecting Your Data in the Microsoft Windows Azure Cloud

Unencrypted Data Represents a Huge Business Risk

Top 3 IBM i (AS/400) Security Tips

HIPAA/HITECH Meaningful Use Updates Strongly Urge Encryption

Encryption and Key Management Explained

How to Prevent a Data Breach in the Cloud

Thank You

Which Data Security Conversation are You Having with Your Customers?

Zen and the Art of System Logging (System Monitoring for your IBM i)

A Letter to Homegrown Data Protection

2012 Data Security in Review

Should Solution Integrators (SIs) Offer Encryption Key Management?

11 Things Solution Integrators (SIs) Need in a Key Management Partner

Data Security – Why Should the CEO Care?

Top 10 Encryption and Key Management Pitfalls

CEOs and the Unseen IT Security Risk

Your IBM i PHP Data Security Project Just Got a Lot Easier

Are Emails and Passwords Personally Identifiable Information (PII)?

What is Enterprise Key Management?

Top Security Blogs of 2012

How Secure are Your Passwords?

SHA-1 Use Expiring for Digital Signature Generation

9 Steps to Easy Encryption Key Management

Data Protection - What Today's Security Admins are Up Against

Healthcare Data Breaches - 4 Major Factors of a $7 Billion Problem

Stolen Secret Service Tapes - Is 2008 Encryption Still Secure?

5 Data Security Myths Debunked: Part 2

5 Data Security Myths Debunked: Part 1

Community Giving: Volunteering at the Local Food Bank

IBM i Has Single Sign On (SSO) - You Just Have to Enable It

3 Big Reasons You Need File Integrity Monitoring (FIM) on Your IBM i

Protecting Sensitive Data in Microsoft Windows Azure with Enryption & Key Management

Don't Do an Encryption Project Twice - 3 Things to Do Before You Start

HIPAA / HITECH Act Breach Notification Meaningful Use Update

Mission Impossible? Data Breaches in the Movies

IBM i File Integrity Monitoring (FIM) - Or, BILL did WHAT ???!!!

NIST Announces SHA-3 - What Does This Mean For You?

Encryption Key Management In the Cloud: 3 Ways

Data Encryption In the Cloud - Microsoft Windows Azure Security Issues

Limiting Encryption Key Access on Alliance Key Manager

Kickboxing is Like a PCI Audit

What Merchant Level am I? Comply with PCI DSS at Every Level

What is File Integrity Monitoring (FIM)? How Do I Achieve it on IBM i?

Alliance Key Manager (AKM) at a Glance: 3 Major Components

Data Breach? We’ll Just Pay the Fine!

Case Study: Preventing Substitution of Cryptographic Keys

IBM i Customers and Compliance Audit Surprises!

Encrypting SharePoint is Easy with Microsoft SQL Server

Outsourcing Credit Cards? You Still Need to Be PCI Compliant

Inspired to Volunteer

Do CIOs Need to Worry About Service Providers?

Microsoft Windows RSA Key Size Change - Will It Impact You?

IBM i FIELDPROC - Do You Need to Update Your PTFs?

What are the First Steps for Encrypting a SharePoint Database?

Encryption Key Management: Don’t Tape Your Key to the Front Door!

Are Colleges and Universities Under Attack? Four Things to Do Now

What is FIELDPROC for IBM i and Why Should I Use It?

Oracle, SQL Server, and Encryption Key Management

Encrypting Your Tapes is Not Enough!

See a ROI with System Logging on Your IBM i (AS/400)

Roadmap to Data Privacy Compliance

.NET Encryption and Key Management

Protecting PII - Passwords, Bank Accounts, and Email Addresses?

Over 8 Million Passwords Hacked? It Happened in Europe.

The Modern CIO: How to Get Better Answers About Data Privacy from Vendors, Cloud Providers, and IT Professionals

HIPAA Safe Harbor Questions and Answers

How is Encryption Used to Protect Protected Health Information (PHI)?

3 Steps to Setting Up An Encryption Key Management HSM

Major Flaw with Proposed Senate Bill 3333 for Data Privacy

How to Protect Databases that Contain Email Addresses and Passwords

CIOs in Healthcare Still in a Reactive Posture

What are HIPAA Encryption Best Practices?

Top 10 Data Breaches So Far This Year? Let’s Count Them...

Meeting PCI-DSS Requirements for Encryption Key Management: Part II

There’s a New Sheriff in Town – Named the FTC

Gone ‘Phishin: Don't Be A Victim

Meeting PCI-DSS Requirements for Encryption Key Management: Part 1

Securing the IBM i Secure Shell (SSH) Server with CHROOT

LinkedIn Likely Used Outdated, Weak Password Hashing Technology

LinkedIn Data Breach: Password Security Best Practices Were Not Used

What Types of Encryption are Available on the IBM i?

Hosting and Cloud Provider PCI Compliance Confusion – No Magic Bullet

What Data Security Compliance Regulation Does My Company Face?

How LinkedIn Could Have Avoided a Breach – And Things You Should Do

Security Certifications and Standards – What Do Auditors Look For?

Data Breach Risk Management with AES Encryption

Why We are Lucky the Fire Didn't Spread

Encryption Key Management - Key Attributes

SQL Server Compliance: Top 5 Things You Can Do to Pass an Audit

HIPAA Security: Healthcare Data Breaches on the Rise

Transparent Data Encryption on SQL Server 2008/2012 – Where are Your Keys?

Alliance LogAgent Suite for System Logging on the IBM i

HIPAA Crack Down - $100,000 Fine to 5 Doctors

Advantages of Third-Party IBM i (AS400) Encryption

Data Breaches Drive Encryption Projects in 2012

Meeting Section 10 of PCI with System Logging on IBM i (AS/400)

The Word “Password” isn’t the Password

System Logging: Log Messages Format for your SIEM - RFC 3164 or CEF?

Upgrade to V7R1 for New Security Features

Chris Evans – Security Blogger

TRICARE: Encryption Could Have Saved the Day

New Secure Shell sFTP in IBM i 7.1 (V7R1)

Commercial PGP Command Line and Our Symantec Partnership

How Emory Healthcare Could Have Avoided A Data Breach Notification

Ensuring Your Social Security

IBM i (AS/400) – Is it a Legacy Platform?

Why Did I Fail a Security Audit on My IBM i (AS/400, iSeries)?

Eye in the Windy City Sky – Is Your Privacy Protected?

Secure Managed File Transfer: Selecting a Vendor

IBM i Security Audit Journal QAUDJRN – Are You Logging Everything?

NSA’s Utah Data Center: Is Everything Safe in Salt Lake?

Meeting Compliance Regulations with Secure Managed File Transfer

Should I Upgrade My IBM i to V6R1 or V7R1?

Could Encryption Have Stopped Stuxnet?

Driving a Taxi and Assessing Your Security Posture

Secure Managed File Transfer on IBM i (AS/400): 4 Core Components

Secure Managed File Transfer: Meeting Business Needs

How Tokenization Can Help Your Business

Securing Data in Microsoft SharePoint 2010

Skip V6R1 on IBM i and Upgrade to V7R1 - A Security Note

The Business Case for Tokenization

Case Study: Encryption Key Management with SQL Server and Oracle

Are You Gambling with $7.2 Million? Maybe.

RSA Key Vulnerability and Random Number Generation

Encrypting & Protecting Medical Data – Some Thoughts Before HIMSS

4 Critical Issues for ISVs Trying to Protect PHI and Meet HITECH Act

System Logging on the IBM i (AS/400): Selecting a Logging Solution

System Logging on the IBM i (AS/400): Log Collection and Compliance

System Logging on the IBM i (AS/400): An Introduction

Data Privacy Day 2012 - Keeping Your Personal Information Safe

Secure SSH sFTP Transfers with Alliance FTP Manager

Managed File Transfer on the IBM i – 4 Core Components

Dreamforce to You: Protecting Sensitive Information

What is the difference between AES and PGP Encryption?

IBM i Encryption: Buy Solution or Use Built-In Libraries?

Giving Back: YWCA’s “The Other Bank”

Data Privacy - We Are All In This Together

Data Protection: Hashes and Salting

Top Five Data Privacy Articles of 2011

FIELDPROC Questions: Tape Backup and Data Masking

FIELDPROC Questions: Performance Problems & Working With BI Tools

FIELDPROC Encryption Performance: Tests You Can Do Before You Buy

Stalled - Encryption of Data at Rest

Encryption Key Management: High Availability (HA) & Disaster Recovery

FIELDPROC Encryption Performance Impacts on the IBM i

Symantec Survey Shows Need for Focus on Encryption Key Management

How Often Do I Need to Rotate Encryption Keys on My SQL Server?

What are the Performance Impacts of TDE Encryption on SQL Server?

FIELDPROC – One Place Encryption Performance Really Matters

Encryption and Key Management on Microsoft SQL Server 2008 – Part 3

Encryption and Key Management on Microsoft SQL Server 2008 – Part 2

Encryption and Key Management on Microsoft SQL Server 2008 – Part 1

Meet PCI DSS & HIPAA/HITECH on SQL Server with Encryption Key Management

Encrypted PDF & ZIP with Managed File Transfer

IBM i FIELDPROC Surprises

Three Questions About Managed File Transfer

Ouch! – I Guess Encryption Standards Actually Do Matter

HIPAA, HITECH Act, & Encryption Key Management Part 2

2011 PASS Summit: Are You Encrypting?

HIPAA, HITECH Act, & Encryption Key Management Part 1

Exhbiting at the PASS Summit 2011 in Seattle

PCI DSS Losing Ground?

Cancer - Not Just a Zodiac Sign for Townsend Security

Federal Data Privacy Law Advances in Senate Bill 1151

5 Take Aways from the 2011 PCI SSC Conference

3 Questions from Encryption Key Management for SQL Server Webinar

Securing SharePoint 2010 Content with Encryption and Key Management

Microsoft SQL Server EKM – Should I use TDE or Cell Level Encryption?

PCI Level 2 Merchants: Encryption Key Management Realization

SQL Server Extensible Key Management (EKM) and Certificates

Data Privacy for the Non-Technical Person Part 3

Data Privacy for the Non-Technical Person Part 2

AES Encryption Flaw - Calm Down

Data Privacy for the Non-Technical Person Part 1

Introducing Alliance Key Manager for SQL Server

SQL Server Encryption & HSM Key Management for the Mid-Market

System Logging for PCI Compliance

Token Generation: New PCI SSC Tokenization Guidance

PCI SSC Issues New Tokenization Guidance

Mastercard Postpones SDP ISA Training Requirements

5 Key Questions Before Starting an Encryption Project

PCI DSS 2.0 and Encryption Key Management - As the Dust Settles

HIPAA/HITECH Act – Encryption and Key Management Requirements

Gaining Efficiency & Business with XML & Web Services - Part 2

Gaining Efficiency & Business with XML & Web Services - Part 1

Silver Success for Townsend Security

Microsoft WPC 2011: SQL Server Encryption and the Cloud

Tokenization & Encryption: The Data Protection Package

Encryption is Like Going to the Gym

5 Must Haves When Selecting an Encryption Key Management HSM

Five Ways to Protect Sensitive Data and Keep Your Database Compliant

Merchants and Smart Phone Payments – PCI Shields Up

Heading to LA for Microsoft's Worldwide Partner Conference

3 Questions from Encryption Key Management Simplified

FIPS-140 Certified Encryption and the "Aha" Moment

Five Ways to Help Your Company Prevent a Phishing Attack

What the CUSP? Beware of This AES Encryption Mode

Encrypted USB Drives Hacked: What Went Wrong?

The 6 Fundamentals of System Logging

Data Encryption vs. Data Scramble

Townsend Security's Spirit of Giving

AES Encryption and NIST Certification

Tokenization: A Cost-Effective Path to Data Protection

Epsilon Data Breach - More Serious Than You Think

COMMON 2011 - Encryption, Customers, and Education

Encryption vs. Tokenization: Which is Best for Your Business?

Security in the Cloud

The Magic at Townsend Security

PGP Encryption: 6 Things You Need to Know

Five Things You Need to Know About Automatic Encryption on the IBM i

Cross-Platform Standards and Secure File Transfer

The IBM i Community Prepares for COMMON

Emerging Data Privacy Regulations

AES Encryption Performance

The Importance of NIST Certification for AES Encryption

5 Commonly Asked Questions About Data Privacy

How Much Data Can You Encrypt with RSA Keys?

10 Questions to Ask Your Key Management Vendor

Key Management Best Practices: What New PCI Regulations Say

The Top 10 Encryption Pitfalls

Enable Transparent Encryption on the IBM i

Townsend Security 2011 Partner Training

Don't Just Love Us Because We Do Encryption & Key Management!

SHARE Mainframe Conference 2011 and PGP Encryption

The Magical Encryption Tour

Migrating to Alliance Key Manager with IBM i Native Encryption APIs

RSA 2011 Security Take Away: Mobile Two Factor Authentication is Hot

Data Privacy in a De-Perimeterized World

Increased Key Management Awareness at RSA Conference 2011

The Uncomfortable Truth About Key Management on the IBM i

A Big Win for IBM i Customers and Townsend Security

Non-Standard Encryption – Now That Bites

SQL Security Attacks: Same Ole, Same Ole

RSA Encryption Key Size Requirements Change in 2011

Encrypted PDF & ZIP on the IBM i

Encryption Key Management: Top IT Initiative

Encryption, Key Management and Tokenization - The Trifecta

PCI DSS 2.0 and Encryption Key Management

Blackberry, Key Management, and Message Security

Encryption and Key Management in a .NET World

XML, Web Services, and Encryption


Subscribe to Email Updates

Posts by Topic

see all