White Papers

Enterprise Data Security

White Papers

Cyberthreat Defense Report

Get the Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,100 IT security professionals representing 15 countries…
Read White Paper

Simplifying GDPR Compliance

Mitigate risk and derive business value as you take on the EU General Data Protection Regulation. GDPR outlines how organizations…
Read White Paper

GDPR Compliance and Its Impact on Security and Data Protection Programs

The GPDR privacy regulation affects organizations anywhere in the world that collect or process personal data on EU residents. Encryption…
Read White Paper

Teradata – HPE SecureData, Your Business Will be Attacked. How Safe is Your Most Valuable Asset?

The risks have never been higher. Companies have more data than ever before, and hackers are more sophisticated and determined…
Read White Paper

HPE Enterprise Secure Key Manager v5

Organizations across all industry and public sectors are increasingly challenged to protect their sensitive information such as cardholder data, patient…
Read White Paper

Evolving Encryption Key Management Best Practices for the Data Center

We are in the midst of an information technology transformation wave which is likely the most disruptive since we built…
Read White Paper

HPE Enterprise Secure Key Manager

The HPE Enterprise Secure Key Manager (ESKM) provides a secure, centralized key management solution for data encryption environments, and merges…
Read White Paper

Coalfire Systems HPE Atalla HSM Analysis Whitepaper

As a recognized leader in IT security, governance, regulatory and compliance, Coalfire Systems, Inc. has been completing independent assessments of…
Read White Paper

HPE SecureData Web PCI DSS Technical Assessment

Executive summary Hewlett Packard Enterprise engaged Coalfire Systems, Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security Assessor…
Read White Paper

HPE SecureData Payments PCI DSS Control Applicability Assessment

Hewlett Packard Enterprise (HPE) engaged Coalfire Systems Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security Assessor (QSA),…
Read White Paper

Using Data-Centric Security to Shrink PCI Compliance Scope eBook

Are you struggling with determining what actions to take and how to reduce compliance costs while improving security for your…
Read White Paper

HPE – BAH Data-Centric Protection: Enabling Business Agility While Protecting Data Assets

White paper by Hewlett Packard Enterprise and Booz Allen Hamilton Corporate, government and other enterprises are under relentless attack by…
Read White Paper

Building Blocks of A Sound ePHI Security Program

IT professionals in today’s healthcare organizations have to contend with urgent operational demands, critical cyber threats, and heightened regulatory scrutiny.…
Read White Paper

HPE Secure Stateless Tokenization

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

The Data is the New Perimeter

There’s no question that technologies keep getting better. The trouble is, so do hackers. Regrettably, they often get better faster…
Read White Paper

Data-Centric Security Against Tomorrow’s Threats

How have data and data management evolved, and why is it important to today’s enterprise IT? I don’t think anyone…
Read White Paper

Establishing a Data-Centric Approach to Encryption

Many data breaches occur at companies that already have a data security policy in place. While some of the millions…
Read White Paper

Streamlining Information Protection through a Data-centric Security Approach

The sophistication and persistence of criminal attacks on online systems is growing, along with government regulations requiring full disclosure for…
Read White Paper

Adventures in Secure Mobile Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being…
Read White Paper

Closing the Gap in Tokenization: Removing the Last Vulnerability

When the card networks adopted the Payment Card Industry Data Security Standards (PCI DSS), they effectively raised the bar on…
Read White Paper

Enterprise Cloud Security

White Papers

Mitigate Security Risks and Embrace the Cloud

The cloud has expanded your security perimeter, creating a more dynamic risk landscape. Build security into the fabric of your…
Read White Paper

Cloud Computing Top Threats in 2016

At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of…
Read White Paper

Definitive Guide to Cloud Access Security Brokers

We hope you will find this Definitive Guide to Cloud Access Security Brokers alarming, reassuring, and informative. Alarming, because we…
Read White Paper

HPE Secure Stateless Tokenization

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Meeting Data Residency and Compliance Challenges in Global Enterprises

In today’s global business environment, companies are increasingly finding their employees, business practices, and IT systems stretched across international boundaries.…
Read White Paper

Protecting Data Into and Throughout the Cloud

With information in the Cloud, suddenly a new team of people has access to your data. At every turn, they…
Read White Paper

Adventures in Secure Mobile Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being…
Read White Paper

Closing the Gap in Tokenization: Removing the Last Vulnerability

When the card networks adopted the Payment Card Industry Data Security Standards (PCI DSS), they effectively raised the bar on…
Read White Paper

Streamlining Information Protection through a Data-centric Security Approach

The sophistication and persistence of criminal attacks on online systems is growing, along with government regulations requiring full disclosure for…
Read White Paper

Email/Mobile Security

White Papers

Techniques for Dealing with Ransomware Business Email Compromise and Spearphishing

Phishing, Business Email Compromise (BEC) and ransomware represent a group of critical security threats that virtually every organization will encounter…
Read White Paper

Peace of Mind in the Cloud: Secure Email Migration to Office 365

In a time of constant hacking attacks and email vulnerabilities exposed, a transition to cloud-based Office 365 is top of…
Read White Paper

Content Encryption: Key Issues to Consider

An Osterman Research White Paper Published September 2015 EXECUTIVE SUMMARY Encryption of electronic content is an essential best practice, despite…
Read White Paper

Payments Security for Retail and E-commerce Card Processing Environments

This white paper describes HPE SecureData Payments Solution – Processor Edition which includes point-to-point encryption (P2PE) and patent-pending HPE Secure…
Read White Paper

Rethinking Email Encryption – Eight Best Practices for Success 

Email continues to play a fundamental role in an organization’s communications and day to day business—and represents a critical vulnerability…
Read White Paper

Smart Devices, Smart Security

If there are any lingering doubts that mobile devices such as smartphones and tablets have profoundly transformed today’s business, one…
Read White Paper

Business Case for HPE SecureMail Mobile Edition

Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central role in…
Read White Paper

Adventures in Secure Mobile Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being…
Read White Paper

Adventures in Secure Mobile Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being…
Read White Paper

Smart Devices, Smart Security

If there are any lingering doubts that mobile devices such as smartphones and tablets have profoundly transformed today’s business, one…
Read White Paper

HPE SecureMail Mobile Edition

Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central role in…
Read White Paper

Closing the Gap in Tokenization: Removing the Last Vulnerability

When the card networks adopted the Payment Card Industry Data Security Standards (PCI DSS), they effectively raised the bar on…
Read White Paper

Streamlining Information Protection through a Data-centric Security Approach

The sophistication and persistence of criminal attacks on online systems is growing, along with government regulations requiring full disclosure for…
Read White Paper

Enterprise Security for Big Data

White Papers

Data Protection and PCI Scope Reduction for Today’s Businesses

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Meeting Data Residency and Compliance Challenges in Global Enterprises 

In today’s global business environment, companies are increasingly finding their employees, business practices, and IT systems stretched across international boundaries.…
Read White Paper

Data-Centric Security Against Tomorrow’s Threats

Sathvik Krishnamurthy has more than 20 years of software industry experience and has been president and CEO of Voltage Security…
Read White Paper

Regulatory and Compliance

White Papers

Five Endpoint Backup Considerations for Ransomware Protection

The threat of a ransomware attack is a major concern businesses are facing today. The United States Federal Bureau of…
Read White Paper

Using Data-Centric Security to Shrink PCI Compliance Scope eBook

Are you struggling with determining what actions to take and how to reduce compliance costs while improving security for your…
Read White Paper

Building Blocks of A Sound ePHI Security Program

IT professionals in today’s healthcare organizations have to contend with urgent operational demands, critical cyber threats, and heightened regulatory scrutiny.…
Read White Paper

Use Case Briefs & QSA Summary

Merchants, service providers, and enterprises face severe, ongoing challenges securing payment card data. Tokenization – replacing card numbers with tokens…
Read White Paper

Data Protection and PCI Scope Reduction for Today’s Businesses

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Payments Security for Merchants and Processors

White Papers

2017 Emerging Technologies Outlook – Mercator

Three new technologies are vital for payments. Three technologies need to be embraced immediately by the payments industry. They are…
Read White Paper

Using Data-Centric Security to Shrink PCI Compliance Scope eBook

Are you struggling with determining what actions to take and how to reduce compliance costs while improving security for your…
Read White Paper

Payments Security for Retail and E-commerce Card Processing Environments

This white paper describes HPE SecureData Payments Solution – Processor Edition which includes point-to-point encryption (P2PE) and patent-pending HPE Secure…
Read White Paper

HPE Secure Stateless Tokenization

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Coalfire Systems Report

HPE Security—Data Security contracted with leading independent security firm Coalfire Systems to provide a security review of the HPE SecureData…
Read White Paper

HPE SecureData Payments Solution – Processor Edition

This white paper describes HPE SecureData Payments Solution – Processor Edition which includes point-to-point encryption (P2PE) and patent-pending HPE Secure…
Read White Paper

Partners

White Papers

Teradata – HPE SecureData, Protect the Data that Powers the Business of Government

To keep their information safe, these organizations must protect the data itself and ensure that if a breach does occur…
Read White Paper

Teradata – HPE SecureData, Your Business Will be Attacked. How Safe is Your Most Valuable Asset?

The risks have never been higher. Companies have more data than ever before, and hackers are more sophisticated and determined…
Read White Paper

Centralize key lifecycle management for reliable storage encryption

NetApp Storage Encryption (NSE) to protect data-at-rest and HPE ESKM to manage keys together offer a comprehensive security solution. NetApp…
Read White Paper

The Connection, A Journal for the HPE Business Technology Community

Even the simplest payment process requires payment card data to be captured, transmitted, stored, and processed across many high risk…
Read White Paper

Payments Security for Merchants

White Papers

HPE Security in Payment Systems by The Nilson Report

HPE Security in Payment Systems by The Nilson Report When Hewlett-Packard split into two companies last year, storage, servers, and…
Read White Paper

HPE SecureData Web PCI DSS Technical Assessment

Executive summary Hewlett Packard Enterprise engaged Coalfire Systems, Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security Assessor…
Read White Paper

HPE SecureData Payments PCI DSS Control Applicability Assessment

Hewlett Packard Enterprise (HPE) engaged Coalfire Systems Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security Assessor (QSA),…
Read White Paper

Payments Security for Retail and E-commerce Card Processing Environments

This white paper describes HPE SecureData Payments Solution – Processor Edition which includes point-to-point encryption (P2PE) and patent-pending HPE Secure…
Read White Paper

HPE Secure Stateless Tokenization

Cyber criminals have proved adept at thwarting existing IT defenses and exploiting weak links in the payments ecosystem. Merchants, service…
Read White Paper

Technology

White Papers

Independent Technical Assessment of HPE Format-Preserving Encryption

Format-Preserving Encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of the same format—for example, encrypting a…
Read White Paper

HPE SecureMail

White Papers

Smart Devices, Smart Security

If there are any lingering doubts that mobile devices such as smartphones and tablets have profoundly transformed today’s business, one…
Read White Paper

HPE SecureMail Mobile Edition

Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central role in…
Read White Paper

Corporate Fact Sheet

White Papers

Ransomware: Holding data hostage

Cybercriminals are continuing to refine and evolve their toolsets and methods of corruption in their quest to stay ahead of…
Read White Paper

Local, remote, and centrally unified key management

When deploying encryption applications, the long-term maintenance and protection of the encryption keys need to be a critical consideration. Cryptography…
Read White Paper

Executive Viewpoint

White Papers

Hardware Security Module Leadership – HPE Atalla HSM Analysis

The focus of this evaluation was on the HPE Atalla HSM (Hardware Security Module) or Host Security Module as defined…
Read White Paper

HPE Security - Data Security

HPE Security - Data Security delivers the most comprehensive capabilities required for a data protection program.

Learn More