NetLib Security’s transparent data encryption (TDE) solutions are an easy and cost effective way to proactively protect your data.
Encryptionizer, our powerful flagship platform, encrypts stored data right out of the box, with virtually no impact on performance.
No changes to your program code. Directly assists with compliance requirements.
Developers, OEMs, ISVs and companies of all sizes use Encryptionizer products to satisfy a pressing security need quickly, and with confidence to protect the safety, integrity and confidentiality of sensitive data.
Encryptionizer provides transparent encryption protection for most popular databases and applications: SQL Server, SQL Express, LocalDB, PostgreSQL, MySQL, MongoDB, Legacy databases, like Visual FoxPro, and more.
Beginners Guide to Encryption for Compliance and Data Protection
On The Cyber Show podcast, NetLib Security CTO David Stonehill warns that only high-performance encryption can protect organizations against today’s risks and tomorrow’s challenges. On a recent episode of The Cyber Show’s podcast “In The Chair”, NetLib Security’s CTO, David Stonehill, discussed a wide range of issues facing the security industry, including encryption, the importance… Read More
Layered security uses multiple defenses against cyber threats. Data at rest encryption is vital, protecting stored data even if other layers are breached and ensuring compliance. The landscape of cyber threats changes everyday for corporations and other organizations. Tackling these threats requires a robust, comprehensive strategy. A single security measure is no longer enough to… Read More
TL;DR: Ever wonder what happened to Visual FoxPro? Turns out, it’s still alive and kicking for thousands of businesses and government agencies, even though Microsoft stopped supporting it ages ago! These applications, written with VFP, were developed at a time when the cybersecurity threat was not as great as it is in today’s modern world…. Read More
How NetLib Security’s Encryptionizer assisted a nonprofit in their mission Compliance regulations continue to drive companies toward seeking optimal data security solutions. Meeting such standards was the goal for LiftFund, a nonprofit CDFI (Community Development Financial Institution) approaching three decades of business, with a focus on microlending to small businesses that may be unable to… Read More
Is your patient data protected? For many industries, compliance becomes a trickier issue every year. New regulations like GDPR and CCPA, in recent years, have joined HIPAA in requiring companies to meet certain standards to protect their customers’ personal data. Meeting these requirements was a major goal for a Medical Device Manufacturer (MDM) with thousands… Read More
What do you think is the key to a successful sports team? The shoes? The favorite sports drink? Player salaries? Complaining about the referees? No – it’s athlete data and analysis. Athlete data analytics is a hot topic in sports that offers a competitive advantage in more ways than one. It holds great value for… Read More
The Crucial Importance of Application Security in Today’s Digital Landscape In our increasingly interconnected world, where technology permeates every aspect of our lives, the need for robust application security has become a critical imperative. As we entrust sensitive data and critical operations to software applications, ensuring their resilience against cyber threats is paramount to safeguarding… Read More
TL;DR: Many users mistakenly assume SQL Server Express includes the same security features as the full version. Relying on SQL Express without additional encryption, however, could expose sensitive data — especially in industries with compliance requirements like HIPAA, PCI, or GDPR. SQL Express, popular with small-to-mid-sized businesses (SMBs) and application developers, lacks full database-level encryption… Read More
The proliferation of ransomware attacks poses a formidable threat to organizations across all sectors. With an alarming frequency of 1.7 million incidents daily, equating to 19 attacks per second, businesses can no longer afford to overlook this critical cybersecurity challenge. For business leaders and IT professionals, the imperative question is: Are you implementing the necessary… Read More
Space. It’s called the final frontier, where no one has gone before. Well, it seems like data encryption has yet to make that one small step for consumer kind, as a new study reveals. Research from the University of California and the University of Maryland have found that of 39 scanned satellites – which carry… Read More
A new poll reveals widespread, bipartisan agreement among American voters on at least one issue: data security/privacy. According to the survey, 96% of voters find it important not to keep Americans’ personal data in Chinese data centers, reflecting a paramount concern with information security in an era of global data. A majority of 83% also… Read More
Bad actors looking to exploit technical vulnerabilities are everywhere: just see how the US Secret Service had to dismantle a network of over 100,000 SIM cards in New York City that would’ve been capable of all kinds of communications disruption. Meanwhile, the expiration date of 2015’s Cybersecurity Information Sharing Act (CISA) is fast approaching, lapsing… Read More