Securing data-at-rest in Docker and OpenShift environments

Extends Vormetric Transparent Encryption controls for data encryption, access control and data access audit logging to data within or linked to containers

Vormetric Container Security

Container technologies are bringing unprecedented benefits to organizations, but also come with new risks. Vormetric Container Security delivers critical encryption, access controls, and data access audit logging capabilities that enable organizations to meet compliance, regulatory, and best practice requirements for safeguarding data within dynamic container environments.

Vormetric Container Security
Prevent Privileged User Abuse

Containers often run with root level systems permissions (For Docker, by default – elsewhere, when specifically enabled), resulting in administrators having full access to container images and system data. Vormetric Container Security offers encryption with data access control, enabling privileged users such as Docker or OpenShift cluster administrators to work as usual, without exposing sensitive information.

Maximize Container Advantages, Minimize Risk

Enforce data security policies in dynamic container environments, even in the cloud. Maximize the benefits of using containers in any environment, without compromising data security.

Address Compliance Requirements

Address the data access control requirements of pertinent compliance and other regulatory mandates—whether you manage payment cards, healthcare records, or other sensitive assets.

Comprehensive Data Security Safeguards

Extends Vormetric Transparent Encryption, enabling security teams to establish data security controls inside of containers. With this extension, you can apply encryption, access control, and data access logging on a per-container basis. Encryption can be applied to data generated and stored locally within the container and to data mounted in the container by network file systems.

Granular Controls and Visibility

Vormetric Container Security offers the detailed visibility and control you need to comply with the most stringent policies and mandates. With this solution, enterprises can establish granular access policies based on specific users, processes, and resource sets within containers. Finally, this solution can establish isolation between containers, so that only authorized containers can access sensitive information.

No changes to container environments

Establish data security controls without having to make any changes to applications, containers or infrastructure sets. The solution even supports common container microservices deployment models, enabling single policies that can apply to all containers running on a container host instance, allowing distinct policies for each container or a mix of policy types.

Requires Vormetric Transparent Encryption as a prerequisite

Platform/Environment Support

  • Docker: 1.12.6 or later
  • OpenShift: 3.4.128 or later
  • Red Hat Enterprise Linux, 7.x
  • Can run on physical systems, VMs, and AWS EC2 instances
  • All other support specifications identical to Vormetric Transparent Encryption

Solution Brief: Vormetric Container Security

Vormetric Container Security delivers critical encryption, access controls, and logging capabilities—so that organizations can meet compliance, regulatory, and best practice requirements for safeguarding data within container environments.

Download

Demo: Vormetric Transparent Encryption

Watch this short demo to learn how Vormetric Transparent Encryption makes it easy to deploy file and database encryption with privileged user access controls and security intelligence log collection across all your server environments (physical, virtual, big data and cloud) with centralized policy and key management. This demo includes an animated demonstration, policy configuration, insider abuse demonstration, and review of the actual audit logs produced.

Play

Research Reports White Papers : Vormetric Transparent Encryption Architecture

Today’s IT and security organizations need to continue to scale their capabilities. They need to employ safeguards around larger volumes of sensitive data. They have to guard against more persistent and sophisticated threats, and they must establish these safeguards in more places. To address these expanding requirements, leading enterprises and government agencies rely on Vormetric Transparent Encryption.

Download
Guarda la nostra demo interattiva Esplora
Richiedi una demo Live Richiedi
Contatta un esperto Contattaci