Encrypting sensitive data in databases, for applications, file repositories
and other enterprise systems is a sound and often required business practice
for regulatory compliance, data breach disclosure protection, intellectual
property protection and insider threat management. However, when
Vormetric Data Security Manager (DSM) appliances offer exceptional
performance, allowing organizations to consolidate policy and key
management while avoiding performance constraints. Vormetric
DSM appliances can manage distributed deployments to thousands
of servers with ease.
Enterprises have gradually deployed point encryption solutions to
meet various compliance mandates and internal data governance
requirements. The resulting conglomeration of disparate vendor
platforms deployed across the enterprise poses a management and
operational headache with each encryption...
Identifying complex security and compliance
threats that puts your data at risk
This twelfth installment of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies.
Federal governments around the world are racing to boost data security against odds not generally faced in the private sector today. Download to learn more about trends in Encryption and Data Security.
When used with an Operational Intelligence platform such as Splunk, the Vormetric Data Security Platform not only encrypts and controls access to your files and databases, but also provides information that is utilized by Splunk. Whether the deployment is physical or virtual, the Vorm...
On Monday July 8th, 2012 US National Security Agency (NSA) Chief Keith Alexander described the state of cyber security in the US while speaking to the American Enterprise Institute event in Washington, D.C. Referencing public and classified sources, Mr. Alexander stated that “…for every com...
Since the introduction of multi-user computer systems over 40 years ago, there
has been a fundamental flaw in their security architecture. The flaw? - The
concept of a Root User, Domain Administrator, System Administrator or other
high level computer operator – and their data access rights. The...
Increasing use of web applications and cloud-based services is driving growth in numbers of secure sockets layer (SSL) connections. Web traffic, including user lDs, login passwords and sensitive account numbers is commonly encrypted and transported using SSL.