Comparison Table

GDE solutions:
  File and Database Encryption Teradata Encryption Tokenization Application Encryption Cloud Key Management
Encrypt data at rest   
Encrypt data in transit      
Encrypt data in the cloud   
Encrypt data in apps         
Tokenization/Data masking      
Simplified key management
Prove compliance
User access controls
Live data transformation