Comparison Table

GDE solutions:
  File and Database Encryption Teradata Encryption Tokenization Application Encryption Cloud Key Management
Encrypt data at rest      
Encrypt data in transit         
Encrypt data in the cloud      
Encrypt data in apps            
Tokenization/Data masking         
Simplified key management   
Prove compliance   
User access controls   
Live data transformation