Database Security

Secure intellectual property, comply with privacy and regulatory mandates

Safeguarding Databases with Encryption

With Thales e-Security's data encryption security solutions, you can gain the capabilities you need to encrypt and secure sensitive data in databases, while avoiding the challenges traditionally associated with database encryption. Thales’ database encryption solutions can help protect your growing database environment from both internal and external threats - on-premises or in the cloud, whatever databases you run.

Database Reliability and Performance

Enterprises have often suffered from performance issues when implementing poorly designed or inefficient database encryption tools, impacting end users and applications that rely on real-time access to data.

Insufficient Security Controls

Database encryption tools built with inadequate security expose the organization to fraud and data breaches. For example, when key management is handled within the database, the DBA has control of both the data and key. Database encryption solutions also often disregard insider abuse and advanced persistent threats, allowing an attacker the time needed to find and expose vulnerabilities.

Complex and Time Consuming Key Management

As the database environment expands, so do the key management challenges. Using multiple key management tools is complex and creates more opportunities for errors and fraud. While database vendors offer key management functionality, this only works when the enterprise uses that vendor's specific databases.

Vormetric Transparent Encryption

Vormetric Transparent Encryption offers the capabilities you need to employ strong database encryption, with minimal effort and performance implications. With Vormetric Transparent Encryption, you can secure sensitive data in databases across your enterprise, whether you’re running Oracle, IBM DB2, Microsoft SQL Server, MySQL, Sybase, NoSQL environments, or any combination thereof.

Vormetric Application Encryption

For organizations that need to apply more granular encryption, including at the column or field level within databases, Thales offers Vormetric Application Encryption. Vormetric Application Encryption simplifies the integration of encryption into existing corporate applications and features standard-based APIs, which are used to perform cryptographic and key management operations. Users can choose between standards-based AES encryption and scheme maintaining format preserving encryption (FPE).

Thales nShield HSM Key Protection

For environments that require higher levels of security, nShield hardware security modules (HSMs) deliver FIPS-certified protection for your database keys. Whether you’re using the Thales e-Security DSM 6100 with an embedded nShield Solo or a stand-alone nShield HSM, nShield helps you meet your needs for high assurance security and compliance. With three different form factors, nShield HSMs serve environments ranging from desktop databases, to single-server databases, to database applications distributed across a network—all while safeguarding keys in a hardened solution.

Database Protection Without Noticeable Performance Impact

Thales database encryption solutions are highly scalable and offer protection of your database environment without compromising performance. Our database encryption has been field-tested in the most performance-intensive environments, with proven scalability to support 50,000 cryptographic transactions per second.

Seamless Implementation

Thales enables database encryption without having to make changes to your applications, infrastructure, or business practices, and makes it simple to extend application-layer encryption across virtual, cloud, big data and traditional environments.

Improved Compliance Posture

The security intelligence built into Vormetric Transparent Encryption provides vital insights needed to track and demonstrate compliance with mandates such as HIPAA, PCI DSS, GLBA, SOX and others.

Webcasts : What You Should Know About Database Encryption

Devastating—that's the best way to describe the impact of not having a strong database security initiative. Did you know that 35% of all cyber attacks today occur without enterprises ever knowing that such an attack took place? It only takes 30 seconds to steal your data – making it humanely next to impossible to stop these sophisticated attacks. Your company's most sensitive financial and customer information is stored in databases, Hadoop and NoSQL platforms that are vulnerable. It's time to increase protection and defend your sensitive data.

Listen Now

Solution Briefs : Vormetric Transparent Encryption

Vormetric Transparent Encryption delivers data-at-rest encryption, privileged user access controls and security intelligence logs to proactively meet compliance reporting requirements for structured databases and unstructured files. With Vormetric Transparent Encryption, IT and security professionals can efficiently safeguard more data, in more environments, and against more threats as sensitive data moves into cloud deployments, big data platforms, virtualized systems and more.


Research and Whitepapers : Vormetric Application Encryption

Vormetric Application Encryption reduces the complexity and costs associated with meeting this requirement, simplifying the process of adding encryption capabilities to existing applications. This architecture paper goes into detail of the security model, best practices, APIs, and offers a sample application encryption library.

인터랙티브 동영상 시청하기 자세히 보기
라이브 데모 예약하기 예약하기
전문가와 상담하기 연락하기