Advanced Data-at-rest Encryption, Access Control and Data Access Audit Logging

Meet compliance and best practice requirements for encryption, access control and data access logging using a proven hardware-accelerated encryption solution

Cyber Security Excellence Awards

Vormetric Transparent Encryption

Vormetric Transparent Encryption enterprise encryption software delivers data-at-rest encryption with centralized key management, privileged user access control and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data, and container environments.

The deployment is simple, scalable and fast, with agents installed at operating file-system or device layer, and encryption and decryption is transparent to all applications that run above it. Vormetric Transparent Encryption is designed to meet data security compliance and best practice requirements with minimal disruption, effort, and cost. Implementation of the server encryption software is seamless keeping both business and operational processes working without changes even during deployment and roll out. The server encryption solution works in conjunction with the FIPS 140-2 up to Level 3 validated Data Security Manager, which centralizes encryption key and policy management for the Vormetric Data Security Platform.

Vormetric Transparent Encryption
Transparent Data Protection

Transparent and continuous file-level encryption that protects against unauthorized access by users and processes in physical, virtual, and cloud environments. Transparent file encryption implementation is seamless and fast, keeping both business and operational processes working without changes even during deployment and roll out.

Scalable and Easy to deploy

Scaling to deployments of tens of thousands of physical or virtual servers, the Vormetric Transparent Encryption solution is available for Windows, Linux, and Unix platforms. The enterprise encryption software can be used, deployed and maintained across physical, cloud, container and big data environments.

Meet Compliance and Best Practice Requirements

Encryption, access controls and data access logging are basic requirements or recommended best practices for almost all compliance and data privacy standards and mandates, including PCI DSS, HIPAA/Hitech, GDPR and many others.

Define Granular Access Controls

Role-based access policies control who, what, where, when and how data can be accessed. Access controls are available for system level users and groups as well as LDAP, Active Directory, Hadoop and Container users and groups. Easily implement privileged user access controls to enable administrators to work as usual, but protect against users and groups that are potential threats to data

High-Performance Hardware Accelerated Encryption

Vormetric Transparent Encryption only employs strong, standard-based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and elliptic curve cryptography (ECC) for key exchange. The agent is FIPS 140-2 Level 1 validated. The overhead from encryption is minimized using the encryption capabilities available in modern CPUs. A distributed agent-based deployment model eliminates the bottlenecks and latency that plague legacy proxy-based encryption solutions.

Broadest Operating System and Environment Support

Secure structured databases and unstructured files across data centers, cloud, containers and big data environments on Linux, Windows and Unix with a single infrastructure and management environment. Encryption, access control and data access audit logging are available without changes to infrastructure, applications or workflow for maximum control with minimal costs and resource requirements.

Comprehensive Security Intelligence.

Identify and stop threats faster with detailed data access audit logs that not only satisfy compliance and forensic reporting requirements, but also enable data security analytics. Pre-built integration and dashboards that make it easy to find denied-access attempts to protected data are available for major system vendors.

Zero-Downtime Data Transformation

Eliminate the downtime required for initial encryption operations by adding the Live Data Transformation option. This patented technology allows for databases or files to be encrypted or re-keyed with a new encryption key while the data is in use without taking applications off-line. There is no other data encryption solution that offers this unique capability.

Platform support:

Microsoft—Windows Server 2019, 2016 and 2012; Linux—Red Hat Enterprise Linux (RHEL), SuSE Linux Enterprise Server, AWS Linux and Ubuntu; UNIX—IBM AIX.

Database support:

IBM DB2, MySQL, NoSQL, Oracle, SQL Server, Sybase, and others

Application support:

Transparent to all applications, including Microsoft, Documentum, SAP, SharePoint, custom applications, and more

Big data support:

Hadoop—Cloudera, Hortonworks, IBM; NoSQL—Couchbase, DataStax, MongoDB; SAP HANA; Teradata

Encryption hardware acceleration:

AMD and Intel AES-NI, IBM P9 cryptographic coprocessor

Agent certification:

FIPS 140-2 Level 1

Container support:

Docker, OpenShift

Cloud Storage support:

AWS: EBS, EFS, S3, S3I, S3 Glacier
AZURE: Disk Storage, Azure Files

Even Platform as a Service (PaaS) environments are supported, with an integrated solution that protects MySQL databases within Pivotal Cloud Foundry – Vormetric Transparent Encryption for Pivotal Cloud Foundry.

Video : Demo: Vormetric Transparent Encryption

Find out just how secure your data can be without impacting business operations. This demo will show you how to secure your most crucial asset, while maintaining the same user experience your stakeholders have learned to expect.

Play

Solution Brief : Vormetric Transparent Encryption

Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure.

Download

Data Sheet : Vormetric Data Security Platform

Find the next level of detail about Vormetric Transparent Encryption and the underlying platform that supports it here. The Vormetric Data Security Platform makes it efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, Vormetric Data Security Platform products can be deployed individually, while sharing efficient, centralized key management.

Download

Solution Brief : Safeguarding Data with Privileged User Access Controls

Since the introduction of multi-user computer systems over 40 years ago, there has been a fundamental flaw in their security architecture. The flaw? – The concept of a Root User, Domain Administrator, System Administrator, Cloud administrator or other high level computer operator – and their data access rights. To learn more about how Thales products on the Vormetric Data Security Platform can help to solve the problem download the report.

Download

Customer Story : Becton Dickinson

Read about how Beckton Dickinson, a global medical technology company, uses Vormetric Transparent Encryption and the Vormetric Data Security Platform to safeguard their data.

Download

White Paper : Vormetric Transparent Encryption Architecture

Today’s IT and security organizations need to continue to scale their capabilities. They need to employ safeguards around larger volumes of sensitive data. They have to guard against more persistent and sophisticated threats, and they must establish these safeguards in more places. To address these expanding requirements, leading enterprises and government agencies rely on Vormetric Transparent Encryption.

Download
Guarda la nostra demo interattiva Esplora
Richiedi una demo Live Richiedi
Contatta un esperto Contattaci