white-papers-icon-light copy

White Papers

Enterprise Data Security

White Papers

HPE SecureData Web PCI DSS Technical Assessment_PCI DSS

Executive summary Hewlett Packard Enterprise engaged Coalfire Systems, Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security Assessor…
Read White Paper

HPE SecureData Payments PCI DSS Control Applicability Assessment

Executive summary Hewlett Packard Enterprise (HPE) engaged Coalfire Systems Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security…
Read White Paper

Using Data-Centric Security to Shrink PCI Compliance Scope eBook

Are you struggling with determining what actions to take and how to reduce compliance costs while improving security for your…
Read White Paper

HPE – BAH Data-Centric Protection: Enabling Business Agility While Protecting Data Assets

White paper by Hewlett Packard Enterprise and Booz Allen Hamilton Corporate, government and other enterprises are under relentless attack by…
Read White Paper

Building Blocks of A Sound ePHI Security Program

IT professionals in today’s healthcare organizations have to contend with urgent operational demands, critical cyber threats, and heightened regulatory scrutiny.…
Read White Paper

HPE Secure Stateless Tokenization

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

The Data is the New Perimeter

There’s no question that technologies keep getting better. The trouble is, so do hackers. Regrettably, they often get better faster…
Read White Paper

Data-Centric Security Against Tomorrow’s Threats

How have data and data management evolved, and why is it important to today’s enterprise IT? I don’t think anyone…
Read White Paper

Establishing a Data-Centric Approach to Encryption

Many data breaches occur at companies that already have a data security policy in place. While some of the millions…
Read White Paper

Streamlining Information Protection through a Data-centric Security Approach

The sophistication and persistence of criminal attacks on online systems is growing, along with government regulations requiring full disclosure for…
Read White Paper

Adventures in Secure Mobile Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being…
Read White Paper

Closing the Gap in Tokenization: Removing the Last Vulnerability

When the card networks adopted the Payment Card Industry Data Security Standards (PCI DSS), they effectively raised the bar on…
Read White Paper

Enterprise Cloud Security

White Papers

Cloud Computing Top Threats in 2016

At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of…
Read White Paper

Definitive Guide to Cloud Access Security Brokers

We hope you will find this Definitive Guide to Cloud Access Security Brokers alarming, reassuring, and informative. Alarming, because we…
Read White Paper

HPE Secure Stateless Tokenization

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Meeting Data Residency and Compliance Challenges in Global Enterprises

In today’s global business environment, companies are increasingly finding their employees, business practices, and IT systems stretched across international boundaries.…
Read White Paper

Protecting Data Into and Throughout the Cloud

With information in the Cloud, suddenly a new team of people has access to your data. At every turn, they…
Read White Paper

Adventures in Secure Mobile Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being…
Read White Paper

Closing the Gap in Tokenization: Removing the Last Vulnerability

When the card networks adopted the Payment Card Industry Data Security Standards (PCI DSS), they effectively raised the bar on…
Read White Paper

Streamlining Information Protection through a Data-centric Security Approach

The sophistication and persistence of criminal attacks on online systems is growing, along with government regulations requiring full disclosure for…
Read White Paper

Email/Mobile Security

White Papers

Content Encryption: Key Issues to Consider

An Osterman Research White Paper Published September 2015 EXECUTIVE SUMMARY Encryption of electronic content is an essential best practice, despite…
Read White Paper

Payments Security for Retail and E-commerce Card Processing Environments

This white paper describes HP SecureData Payments Solution – Processor Edition which includes point-to-point encryption (P2PE) and patent-pending HP Secure…
Read White Paper

Rethinking Email Encryption – Eight Best Practices for Success 

Email continues to play a fundamental role in an organization’s communications and day to day business—and represents a critical vulnerability…
Read White Paper

Smart Devices, Smart Security

If there are any lingering doubts that mobile devices such as smartphones and tablets have profoundly transformed today’s business, one…
Read White Paper

Business Case for HPE SecureMail Mobile Edition

Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central role in…
Read White Paper

Adventures in Secure Mobile Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being…
Read White Paper

Adventures in Secure Mobile Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being…
Read White Paper

Smart Devices, Smart Security

If there are any lingering doubts that mobile devices such as smartphones and tablets have profoundly transformed today’s business, one…
Read White Paper

HPE SecureMail Mobile Edition

Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central role in…
Read White Paper

Closing the Gap in Tokenization: Removing the Last Vulnerability

When the card networks adopted the Payment Card Industry Data Security Standards (PCI DSS), they effectively raised the bar on…
Read White Paper

Streamlining Information Protection through a Data-centric Security Approach

The sophistication and persistence of criminal attacks on online systems is growing, along with government regulations requiring full disclosure for…
Read White Paper

Enterprise Security for Big Data

White Papers

Data Protection and PCI Scope Reduction for Today’s Businesses

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Meeting Data Residency and Compliance Challenges in Global Enterprises 

In today’s global business environment, companies are increasingly finding their employees, business practices, and IT systems stretched across international boundaries.…
Read White Paper

Data-Centric Security Against Tomorrow’s Threats

Sathvik Krishnamurthy has more than 20 years of software industry experience and has been president and CEO of Voltage Security…
Read White Paper

Regulatory and Compliance

White Papers

Using Data-Centric Security to Shrink PCI Compliance Scope eBook

Are you struggling with determining what actions to take and how to reduce compliance costs while improving security for your…
Read White Paper

Building Blocks of A Sound ePHI Security Program

IT professionals in today’s healthcare organizations have to contend with urgent operational demands, critical cyber threats, and heightened regulatory scrutiny.…
Read White Paper

Use Case Briefs & QSA Summary

Merchants, service providers, and enterprises face severe, ongoing challenges securing payment card data. Tokenization – replacing card numbers with tokens…
Read White Paper

Achieving PCI DSS 3.0 Compliance with HPE Security – Data Security

The Payment Card Industry Security Standards Council (PCI SSC) released an updated version of its Data Security Standard (version 3.0)…
Read White Paper

Data Protection and PCI Scope Reduction for Today’s Businesses

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Payments Security for Merchants and Processors

White Papers

Using Data-Centric Security to Shrink PCI Compliance Scope eBook

Are you struggling with determining what actions to take and how to reduce compliance costs while improving security for your…
Read White Paper

Payments Security for Retail and E-commerce Card Processing Environments

This white paper describes HP SecureData Payments Solution – Processor Edition which includes point-to-point encryption (P2PE) and patent-pending HP Secure…
Read White Paper

HPE Secure Stateless Tokenization

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Achieving PCI DSS 3.0 Compliance with HPE Security – Data Security

The Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 dictates that organizations processing and storing credit card data, including…
Read White Paper

Coalfire Systems Report

HPE Security—Data Security contracted with leading independent security firm Coalfire Systems to provide a security review of the HPE SecureData…
Read White Paper

HPE SecureData Payments Solution – Processor Edition

This white paper describes HPE SecureData Payments Solution – Processor Edition which includes point-to-point encryption (P2PE) and patent-pending HPE Secure…
Read White Paper

Payments Security for Merchants

White Papers

HPE Security in Payment Systems by The Nilson Report

HPE Security in Payment Systems by The Nilson Report When Hewlett-Packard split into two companies last year, storage, servers, and…
Read White Paper

HPE SecureData Web PCI DSS Technical Assessment_PCI DSS

Executive summary Hewlett Packard Enterprise engaged Coalfire Systems, Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security Assessor…
Read White Paper

HPE SecureData Payments PCI DSS Control Applicability Assessment

Executive summary Hewlett Packard Enterprise (HPE) engaged Coalfire Systems Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security…
Read White Paper

Payments Security for Retail and E-commerce Card Processing Environments

This white paper describes HP SecureData Payments Solution – Processor Edition which includes point-to-point encryption (P2PE) and patent-pending HP Secure…
Read White Paper

HPE Secure Stateless Tokenization

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Partners

White Papers

The Connection, A Journal for the HPE Business Technology Community

Even the simplest payment process requires payment card data to be captured, transmitted, stored, and processed across many high risk…
Read White Paper

Technology

White Papers

Independent Technical Assessment of HPE Format-Preserving Encryption

Format-Preserving Encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of the same format—for example, encrypting a…
Read White Paper

HPE SecureMail

White Papers

Smart Devices, Smart Security

If there are any lingering doubts that mobile devices such as smartphones and tablets have profoundly transformed today’s business, one…
Read White Paper

HPE SecureMail Mobile Edition

Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central role in…
Read White Paper

HPE Security - Data Security

HPE Security - Data Security delivers the most comprehensive capabilities required for a data protection program.

Learn More