SIMPLE ONE-STOP, DATA-AT-REST SECURITY

Vormetric Data Security Platform

The Vormetric Data Security Platform makes it efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, the Vormetric Data Security Platform features several products that can be deployed individually, while offering efficient, centralized key management. These products deliver capabilities for transparent file-level encryption, application-layer encryption, tokenization, cloud encryption gateway, integrated key management, and security intelligence logs. Through the platform’s centralized key management and flexible implementation, you can address security policies and compliance mandates across databases, files, and big data environments—whether assets are located in the cloud, virtual or traditional infrastructures. With this platform’s comprehensive, unified capabilities, you can efficiently scale to address your expanding security and compliance requirements, while significantly reducing total cost of ownership (TCO).

Vormetric Data Security Platform

Vormetric Data Security Platform Delivers Data-at-Rest Security
to Encrypt Everything, Everywhere

The Vormetric Data Security Platform Key Attributes

  • Lower total cost of ownership. The Vormetric Data Security Platform makes it simpler and less costly to protect data at rest. The platform enables your IT and security organizations to quickly safeguard data across your organization in a uniform and repeatable way. Instead of having to use a multitude of point products scattered across your organization, you can take a consistent and centralized approach with the Vormetric Data Security Platform.
  • Maximize staff and resource efficiency. The Vormetric Data Security Platform makes administration simple and efficient, offering an intuitive Web-based interface, as well as an application programming interface (API) and command-line interface (CLI). With the solution, data-at-rest security can be applied quickly and consistently, maximizing staff efficiency and productivity. Further, this high-performance solution enables optimized use of virtual and physical server resources, reducing the load on the service delivery infrastructure.
  • Strengthen security and compliance. Moving security close to the data is more effective because it minimizes the potential for any surreptitious access. Vormetric offers a unique approach for protecting sensitive data across the entire organization, including in databases, files, and big data nodes. The platform provides capabilities for encrypting and tokenizing data, controlling access, and creating granular security intelligence logs. These security intelligence logs can accelerate detection of advance persistent threats (APTs) and insider threats because they offer visibility into file access. In addition, these logs satisfy many common compliance reporting requirements.

Vormetric Data Security Platform Products

  • Vormetric Data Security Manager. Offers centralized management of keys and policies for the entire suite of products available within the Vormetric Data Security Platform. It is available as a virtual or FIPS 140-2 physical appliance.
  • Vormetric Transparent Encryption. Features an agent that runs in the file system to provide high-performance encryption and least-privileged access controls for files, directories, and volumes. Enables encryption of both structured databases and unstructured files.
  • Vormetric Tokenization with Dynamic Data Masking. Delivers capabilities for easily adding database tokenization and dynamic display security to existing applications. Enables compliance with PCI DSS and security policies, while minimizing disruption and administrative overhead.
  • Vormetric Cloud Encryption Gateway. Assure data is secure and compliant when it moves to cloud storage environments like Box and Amazon S3 by encrypting the data before it leaves the customer premises and logging all access.
  • Vormetric Application Encryption. Simplifies the process of adding column-level encryption into existing applications. Reduces complexity for developers by offering documented, standards-based APIs that can be used to perform cryptographic and key management operations.
  • Vormetric Key Management. Can be used to centrally manage keys for Vormetric products, Oracle Transparent Data Encryption (TDE), and Microsoft SQL Server TDE. Securely stores certificates and offers support for the Key Management Interoperability Protocol (KMIP).
  • Vormetric Security Intelligence. Delivers granular logs that provide a detailed, auditable record of file access activities. Enables easy integration with security information and event management (SIEM) systems to streamline compliance reporting and accelerate threat detection.
  • Vormetric Protection for Teradata Database. Offers the comprehensive, granular controls required to secure the most sensitive assets across Teradata environments—while maximizing the business benefits of big data investments.

ARCHITECTURE WHITEPAPER

Vormetric Data Security Architecture

Vormetric Data Security Architecture

A comprehensive architecture for data-centric security leveraging encryption, access controls and security intelligence across physical, virtual...

Download >>

DATA SHEETS

Vormetric Data Security Platform

Vormetric Data Security Platform

The Vormetric Data Security Platform makes it efficient to manage data-at-rest security...  

Download >>

ANALYST QUOTE

 Ideally you will leverage existing investments as much as possible, to reduce both capital and operational overhead. And if you are just getting started, try to pick a platform that is flexible to support future needs. 

Rich Mogull,
CEO,
Securosis
 

WHITE PAPERS

Tokenization

Tokenization White Paper

Download >>

ANALYST REPORTS

Tokenization

Selecting the Right Encryption Solution by Securosis

Download >>
Tokenization

Encryption as an Enterprise Strategy

Download >>

VORMETRIC eBOOK

Tokenization

Securing Data in an Unsecure World

Download >>

2015 INSIDER THREAT REPORT

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • FireHost
  • QTS
  • Teleperformance Secures
  • Delta Dental