StrongKey

StrongKey

Recent Posts

IoT

Manufacturing Station Integrated PKI with Highest Authentication for a Global Biopharmaceutical Company

PREVIEW This California-based medical-device company is a leader in the global wellness industry with best-in-class aesthetic products since 2005. For 10 years, this company has been using StrongKey’s customized solutions to ensure the highest level ...
View this resource

Mitigating Security Risks for Remote Employees during COVID-19

COVID-19 has brought about unprecedented measures to protect the human race from what has evolved into a pandemic. The global business community has primarily made the decision to work from home. But what does a fully remote team mean for your busine...
View this resource

Tellaro™ E1000 – Enterprise Solution

With multiple flexible deployment options and scalability to keep your business secure as it grows, the E-Series appliance is an ideal option for enterprises looking to deploy encryption, key management, strong authentication, and digital signatures.
View this resource

Tellaro™ T100 – Medium Enterprise Solution

With multiple flexible deployment options and scalability to keep your business secure as it grows, the T-Series appliance is an ideal option for  smaller and mid-size businesses looking to deploy encryption, key management, strong authentication, an...
View this resource

Implementing Your First FIDO2 Web Application

Do you want to learn how to get rid of passwords in under 30 minutes? StrongKey is partnering with the FIDO Alliance to Make Breaches (and passwords) Irrelevant. Learn how a FIDO2 authenticator (like Yubico's Yubikey) and StrongKey's FIDO2 server com...
View this resource

PCI DSS Compliance Made Easy

This data sheet illustrates how StrongKey’s hardware, the Tellaro, and application allow you to comply with the 15 most difficult PCI DSS controls, so you can be confident heading into your audit.
View this resource

Getting Ready for Passwordless Authentication with FIDO2

StrongKey CTO, Arshad Noor, has previously given this presentation at the CA Cybersecurity Education Summit 2019, and at the January 2020 edition of the ISSA RTP monthly meeting. This seminar covers a comprehensive introduction to FIDO2, explaining t...
View this resource

Complying with GDPR – Data Protection Done Right

This data sheet illustrates how StrongKey's solutions can help you with data protection, by focusing on security data, first. This document includes:
View this resource

Application-Level Encryption and Strong Authentication

This document explains why and how application-level encryption and strong authentication are the cornerstone of really good security, keeping attackers' paws off your sensitive data even if they've breached your network.
View this resource

Protecting Your Organization Against Ransomware

From March to June of 2019 alone there was a 184% jump in the average ransom paid by companies to regain access to their information. From city governments to hospitals, we’re seeing this infiltrate all industries; small-to-medium sized companies and...
View this resource

Becoming GDPR Compliant

With data breaches as a mainstay in news headlines, more companies are taking responsibility for the relationships they hold with customers and aiming to protect the trust they have placed in them. To do so, an important step is becoming GDPR-complia...
View this resource

Hybrid Cloud Security Architecture: Rethinking web application architectures for the cloud

This white paper presents an architecture for building the next generation of web applications. This architecture allows you to leverage emerging technologies such as cloud computing, cloud storage and enterprise key management infrastructure (EKMI) ...
View this resource

Corserv Achieves Scalable Growth Using High-volume Tokenizing Service

“We bootstrapped our startup using StrongKey. It was our platform of choice out of the gate because it was the least expensive by a long shot, has a simple API, and makes tokenization easy.” – Andrew Barringer, Director of Network Operations
View this resource

Providing Cost-effective, Reliable, and Secure Solutions for a Nationally Leading Payment Gateway

“StrongKey plays an integral role within the fabric of our IT Operations, Security, and Compliance. It helps us process $12 billion dollars on an annual basis… providing a seamless service in tokenizing credit card and ACH data and encrypting sensiti...
View this resource

ABC Financial Streamlined Their PCI DSS Key Management Audits with Clear Documentation

“Coming on board as a new compliance officer, I reviewed the documentation provided by StrongKey for our encryption solution and was elated with how self-contained it was, plus it automatically employed internal key rotation. It was as easy as just s...
View this resource

Multifactor Authentication for E-Commerce

StrongKey collaborated on this guide published by NIST’s NCCoE on "Multifactor Authentication for E-Commerce." The guide provides practical, real-world guidance so retailers can use MFA to improve assurance of purchaser identity and to help reduce e-...
View this resource

FIDO for PSD2 – Providing For a Satisfactory Customer Journey

StrongKey’s CTO, Arshad Noor, collaborated on this white paper published by the FIDO Alliance to help illustrate how FIDO’s strong, encryption-backed authentication can apply to PSD2’s Regulatory Technical Standards for Strong Customer Authentication...
View this resource

FIDO Authentication and the GDPR

If you’re looking to understand how FIDO’s strong, encryption-backed authentication can apply to the EU’s General Data Protection Regulation (GDPR), check out this white paper published by the FIDO Alliance to gain deeper insights.
View this resource

FIDO Relevance for GDPR

The FIDO Alliance recently released an FAQ on how its authentication protocols help companies control access to and permissions for data—a key component for GDPR compliance.
View this resource

FIDO and PKI Integration in Enterprise – Best Practices

StrongKey’s CTO, Arshad Noor, collaborated on this white paper published by the FIDO Alliance to help illustrate how to integrate FIDO’s strong, encryption-backed authentication into enterprise organizations using PKI.
View this resource

No Result Found

Load More

Sorry no result found