Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure. The deployment of our data-at-rest encryption software is simple, scalable and fast, Vormetric Transparent Encryption Agents are installed above the file system on servers or virtual machines to enforce data security and compliance policies. As with all Vormetric encryption products, on-going policy and encryption key management operations are centralized and efficient with the Vormetric Data Security Manager.
No application changes are required for Vormetric Transparent Encryption software to deliver data encryption, privileged user access control and security intelligence
The following optional extensions are available for Vormetric Transparent Encryption:
Vormetric Live Data Transformation Extension adds zero-downtime encryption deployment and encryption key rotation to the Vormetric Transparent Encryption feature set with a simple upgrade. A database or le system can be used normally while it is undergoing encryption.
Vormetric Transparent Encryption Docker Extension brings the power of Vormetric Transparent Encryption into Docker environments, enabling policy-based encryption, access controls and data access audit logging on a per container basis for information stored within Docker containers, or accessed from Docker
Vormetric Transparent Encryption
Vormetric Transparent Encryption Use Cases
Aberdeen Group Demystifies Data-at-Rest Encryption
Forrester Research Webinar