DATABASE ENCRYPTION

Vormetric Data Security Use Cases

Database Encryption for Safeguarding Sensitive Data

Encrypting sensitive data in databases has clearly gone beyond optional, and is now a firm requirement. Whether an organization is looking to secure intellectual property, comply with privacy or regulatory mandates, or simply guard the organization’s brand against the damage associated with data breaches, database encryption represents a vital imperative.

By providing database encryption for sensitive data in databases, organizations can establish a strong line of defense that can help secure sensitive assets against a range of threats. However, while the reasons to adopt database encryption are clear, that doesn’t mean the effort is simple. In fact, for many organizations, database encryption has presented a range of obstacles, including degraded database performance, laborious revisions to application code, and complex and time consuming key management efforts.

With Vormetric solutions, you can gain the capabilities you need to encrypt and secure sensitive assets in databases, while avoiding the challenges traditionally associated with database encryption. Today, Vormetric offers a range of offerings that help safeguard assets in databases. Following is more information on each product:

Vormetric Transparent Encryption

Vormetric Transparent Encryption offers the capabilities you need to employ strong database encryption, with minimal effort and performance implications. With Vormetric Transparent Encryption, you can secure sensitive assets in databases across your enterprise, whether you’re running Oracle, IBM DB2, Microsoft SQL Server, MySQL, Sybase, NoSQL environments, or any combination thereof. Vormetric Transparent Encryption offers these key features:

  • Seamless implementation.By leveraging this solution’s transparent approach, your organization can implement database encryption, without having to make changes to your applications, infrastructure, or business practices.
  • Granular access controls.Vormetric Transparent Encryption provides fine-grained, policy-based access controls that restrict access to encrypted data. Privileged users—whether cloud, virtualization, or storage administrators—can manage systems, without gaining access to encrypted data, unless they have expressly been granted permissions to do so.
  • Detailed security intelligence.Vormetric logs capture all access attempts to protected data. These security intelligence logs can accelerate detection of advanced persistent threats (APTs) and insider abuse because they offer visibility into file access. Further, these logs provide vital intelligence needed to track and demonstrate compliance.

Vormetric Application Encryption

For organizations that need to apply more granular encryption, including at the column or field level within databases, Vormetric offers Vormetric Application Encryption. Vormetric Application Encryption simplifies the integration of encryption into existing corporate applications. The product features standards-based APIs, which are used to perform cryptographic and key management operations. Vormetric Application Encryption equips you with these capabilities:

  • Protect sensitive data.Vormetric Application Encryption enables you to stop unauthorized individuals—whether they’re malicious DBAs, hackers, or authorities with subpoenas—from accessing valuable data in databases.
  • Deploy with confidence.Vormetric high-performance encryption and key management agents have been proven to deliver the availability and performance needed in the most performance-intensive environments. The solution has been proven to scale to support 50,000 cryptographic transactions per second.
  • Support heterogeneous environments.Vormetric Application Encryption makes it simple to extend application-layer encryption across virtual, cloud, big data, and traditional environments that run Linux and Windows.

Key Management for Oracle and Microsoft SQL Server Database Encryption

For enterprises that have chosen to use Transparent Data Encryption (TDE) in their Oracle or Microsoft SQL Server environments, Vormetric offers an encryption solution that enables secure and efficient management of cryptographic keys.

Vormetric Key Management can centrally manage keys from all Vormetric products, Microsoft TDE, Oracle TDE, and other Key Management Interoperability Protocol (KMIP)-compliant encryption platforms. As a result, organizations can more centrally and securely manage all their encryption keys, while streamlining key administration efforts.

By leveraging Vormetric Key Management, security teams can avoid the cost and effort of having to support multiple key managers—and more easily ensure keys are properly stored, secured, and backed up. Vormetric Key Management also offers these advantages:

  • Manageability.Vormetric Key Management provides key generation, recovery, and expiration tracking for the master and database encryption keys for all integrated encryption devices.
  • Availability.Vormetric Key Management increases data availability by storing encryption keys in highly reliable Data Security Manager appliances, which can be configured in a redundant fashion to support failover and disaster recovery.
  • Granular access controls.Vormetric Key Management provides separation of duties between IT functions and encryption key management, including key generation, storage, expiration tracking, and auditing of key operations.

VIDEO

Forrester Research Webinar

Defender of Data

What You Should Know About Database Encryption   Watch Now >>

 

CUSTOMER QUOTE

We run a diverse environment; including a Sun Solaris™ 10 stack for our legacy OLTP Sybase system and multiple Microsoft® SQL servers that host newer applications. In order to keep our IT operations running efficiently, we wanted a single encryption product that could support everything.

Trey Smith, Driven Solutions’ chief technical officer

View More

 

CUSTOMER QUOTE

 Another significant factor was the way that Vormetric avoids us having to make any changes to our applications, storage or internal processes. We really liked being able use a single integrated solution for data encryption and key management to secure our diverse set of structured and unstructured data across the environment. 

Praveen Sharabu,
Senior Director,
Con-way’s IT Infrastructure and Vendor Management Office

SOLUTION BRIEF

Encryption Architecture

Imperva and Vormetric DAM and Encryption for Layered Defense Solution BrochureDownloadRead More

 

WHITE PAPERS

Encryption Architecture

Protecting Sensitive Data In and Around an Oracle Database White PaperDownload

Encryption Architecture

Protecting Sensitive Data In and Around a Microsoft SQL Server DatabaseDownloadRead More

 

DATA SHEETS

Encryption Architecture

Vormetric Data Security Platform Data SheetDownloadRead More

 

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • FireHost
  • QTS
  • Teleperformance Secures
  • Delta Dental