Encrypting sensitive data in databases, for applications, file repositories
and other enterprise systems is a sound and often required business practice
for regulatory compliance, data breach disclosure protection, intellectual
property protection and insider threat management. However, when
Vormetric Data Security Manager (DSM) appliances offer exceptional
performance, allowing organizations to consolidate policy and key
management while avoiding performance constraints. Vormetric
DSM appliances can manage distributed deployments to thousands
of servers with ease.
Enterprises have gradually deployed point encryption solutions to
meet various compliance mandates and internal data governance
requirements. The resulting conglomeration of disparate vendor
platforms deployed across the enterprise poses a management and
operational headache with each encryption...
Download the 2019 Thales Data Threat Report Executive Summary now!
The 2019 Thales Data Threat Report Executive Summary contains the most important findings of the full 2019 Thales Data Threat Report in a short 7-page summary for busy executives. Insights include:97% percent of organizations use se...
This twelfth installment of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies.
Federal governments around the world are racing to boost data security against odds not generally faced in the private sector today. Download to learn more about trends in Encryption and Data Security.
When used with an Operational Intelligence platform such as Splunk, the Vormetric Data Security Platform not only encrypts and controls access to your files and databases, but also provides information that is utilized by Splunk. Whether the deployment is physical or virtual, the Vorm...
On Monday July 8th, 2012 US National Security Agency (NSA) Chief Keith Alexander described the state of cyber security in the US while speaking to the American Enterprise Institute event in Washington, D.C. Referencing public and classified sources, Mr. Alexander stated that “…for every com...
Since the introduction of multi-user computer systems over 40 years ago, there
has been a fundamental flaw in their security architecture. The flaw? - The
concept of a Root User, Domain Administrator, System Administrator or other
high level computer operator – and their data access rights. The...
Vormetric provides a critical component of the solution to this problem –
protection for your customer’s data – regardless of the environment and
deployment model of your cloud. Vormetric Data Security enables you to safely
and securely protect customer data in your cloud environment with a...