What it can do for your business

Vormetric Transparent Encryption delivers data encryption with flexible key management, granular access controls and detailed data access event logs, enabling enterprises to protect, control, and track sensitive data wherever it resides including enterprise premises, private and public cloud environments. The data security solution enables customers to administer and manage key and access policies to control who, what, when and how data can be accessed to meet compliance and audit needs.
Vormetric Transparent Encryption

Easy to Deploy Encryption for the Cloud

Easy to deploy encryption and access control without changing applications or infrastructure.

Maintain Control of Data in the Cloud

Prevent cloud administrators, root, network system administrative and unauthorized users and applications access to restricted data.

Security Intelligence To Continuously Monitor Access

Collects security intelligence information to use for compliance reporting and to accelerate the detection of insider abuse and APTs.

Essential information

  • Transparent Data Protection: Vormetric Transparent Encryption is an easy to deploy software agent that runs across Windows, Linux and UNIX platforms. Both structured and unstructured data are encrypted without changing applications or user experience.
  • Secure Key Management and Certificate Storage: Unify key management for Oracle, Microsoft SQL TDE keys, secure storage of certificates and supports KMIP and PKCS#11 standards.
  • Security Intelligence for Continuous Monitoring: Every attempted access to data that is protected can be logged and shared using standard syslog formats. These logs are easy to integrate with Vormetric SIEM partners: IBM QRadar, Splunk, HP ArcSight, and LogRhythm. This helps raise visibility of abusive data access on servers. These logs are also a powerful tool in compliance reporting.
  • Big Data Security: Vormetric Transparent Encryption seamlessly encrypts structured and unstructured source data as well as the output reports. Policy can control who can access the source data and view the output reports.
Vormetric Transparent Encryption enables data-at-rest encryption, access control and the collection of security intelligence logs.

Company information

Vormetric Transparent Encryption

Provided by Vormetric

Vormetric Transparent Encryption