Vormetric Customer Success

MEDIUM ENTERPRISE COMPUTER SERVICES

English

Medium Enterprise Computer Software Company

Medium Enterprise Computer Services Company

Medium Enterprise Computer Services Company

Download

Challenges

  • Is concerned about protecting the following types of information:
    • Credit Card information
    • Healthcare information
    • Employee PII
    • Customer PII
  • Require data protection during the following circumstances:
    • Database security
    • Unstructured data security
    • Contractual requirements (either with a customer or for suppliers)
    • Legacy application security

Use Case

  • Applies Vormetric Data Security to adhere to global compliance regimes in the following ways:
    • Secure and controls access to ePHI – both unstructured medical imagery or structured database information from HIPAA/HITECH
    • Provide safe harbor and helps businesses avoid the cost and brand damage that comes with breach notification
    • Meet national data protection laws that mandate encrypting citizen personal information including UK Data Protection Act, EU Data Protection Directive and South Korea’s Personal Information Protection Act
    • Secure personal information
  • Uses Vormetric Data Security to achieve the following:
    • Lock down their data with encryption, strong key management, and security intelligence
    • Create strict access policies that ensure only authorized users can access sensitive information
    • Reduce the attack surface against sophisticated Cyber threats, including Advanced Persistent Threats (APTs) and zero-day attacks
    • Incorporate security intelligence that generates log information for behavioral analysis
  • Uses the following SIEM solutions to identify possible internal threats or APTs:
    • LogRythm
    • GFI Languard

Results

  • Prevents the following insiders from accessing protected data with Vormetric:
    • System administrators
    • Domain administrators
    • Network administrators
    • UNIX/LINUX root users
  • Purchased Vormetric Data Security for the following reasons:
    • Network-centric and perimeter security do not protect sensitive data
    • A data-centric strategy locks down the data, and removes risk from privileged users
    • Vormetric sets controls around the data and examines controls from the inside out
    • Data is the main target for APTs and server data is the biggest target
    • Data-centric security mitigates risk and reduces the attack surface for APTs
  • Rates the likelihood of recommending Vormetric as 10 out of 10.

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental