Upcoming Webinar:

FIELDPROC Encryption on IBM i

Your encryption project just got easier! Learn how automatic encryption is now possible on IBM i V7R1 with NO APPLICATION CHANGES!

 

Webinars You Can't Miss:

Encryption and Key Management Everywhere Your Data Is

Encryption and key management can be deployed in your data center, as a virtual machine, and now in the cloud as both a virtual machine or cloud HSM. With new options, encrypting data is now easier and more affordable than ever.

 

Two Factor Authentication on the IBM i

Usernames and passwords are no longer good enough. To protect your sensitive data on your IBM i, you need another layer of security.

 

Encryption and Key Management for Microsoft SQL Server

Hackers don't break encryption. They find your keys.  The most critical barrier SMB companies face is access to compliance solutions that are affordable.  In this 30-minute webinar, Townsend Security will introduce you to Alliance Key Manager for SQL Server.

Payment Card Industry Data Security Standards

PCI DSS version 2.0 has been announced. Is your organization prepared? NIST Certified encryption and key management solutions help organizations meet PCI compliance requirements. Read more

 

HITECH/HIPAA

Strong encryption and comprehensive key management meet compliance requirements in HIPAA. Only NIST certified encryption provides companies with a safe harbor from the breach notification requirement in HITECH. Read more

AIG Bass Pro Shops Costco
DHL HSBC Mayo Clinic
Penske Scott Trade Staples

 

Encryption Key Management for Windows Azure

 

Auditor Resources

A special section designed for IT Security and QSA Auditors interested in learning about regulatory compliance on the IBM i.

Read more.

Testimonial

“Staples wouldn’t even consider a vendor solution without NIST certification.”

iSeries Platform Engineer / Staples

#

Experience Townsend - Our Latest Blog Article

Drupal CMS and Changes in HIPPA/HITECH Regulatory Compliance

Securing data with encryption and protecting the encryption keys with proper key management is addressed in many compliance regulations and security best practices. Let’s take a look at the Security Rule and Omnibus Rule (update to HIPAA/HITECH compliance regulations) that cover Protected Health In...