Data Security and Protection in Virtualized Machines

Thales eSecurity security solutions protect data within virtual server environments like VMware and other major hypervisor platforms

Virtual Environment Security

Organizations today face a broadening and increasingly sophisticated set of threats to the security of their sensitive data. These include privileged user abuse and advanced persistent threat (APT) attacks. As organizations grow increasingly reliant on virtual servers, their physical and virtual server security challenges grow in complexity and scale. Sensitive data grows increasingly mobile. It is copied across many virtual machines. It is spread across the storage infrastructure and an increasingly diverse mix of physical platforms and operating systems. In this kind of environment, organizations need the persistent, robust, flexible, and comprehensive safeguards Thales eSecurity provides to ensure sensitive data remains secure and compliant.

Virtual Machine
Data Security in Virtual Machines

When an organization runs sensitive data in fluid virtual machines, that data needs to be secured through robust, persistent, and auditable controls. Without virtual server security, the organization exposes itself to data breaches, penalties for non-compliance and a sullied reputation.

Comprehensive Data Security for Multiple Platforms

Vormetric Transparent Encryption from Thales eSecurity delivers the virtual server security capabilities you need to safeguard your sensitive assets. Whether you’re running VMware, Microsoft Hyper-V, KVM (Kernel-based Virtual Machine), or any other standard virtualization platform, Thales eSecurity can help you address your critical virtual machine security compliance requirements, with unparalleled efficiency and low cost of ownership.

Data at Rest Encryption in Virtual Machines

Thales eSecurity enables you to encrypt data at the file system or volume level within virtual machines (VMs) and then use fine-grained, centrally managed policies to control access to protected data. As a result, you can enforce security policies and track access, no matter where data is copied or moved.

Granular Access Controls

Vormetric Transparent Encryption from Thales eSecurity provides fine-grained, policy-based controls that restrict access to encrypted data. Privileged users—whether cloud, virtualization, or storage administrators—can manage systems, without gaining access to encrypted data, unless they have expressly been granted permissions to do so.


For fast rollouts and integration within virtualized machines, both web and command-line level APIs provide access to the Vormetric Data Security environment for policy management, deployment, and monitoring.


By delivering capabilities for segregating security management domains, Thales eSecurity helps organizations address internal security policies and compliance mandates. Further, these security capabilities enable service providers to establish strong boundaries between customer environments, while still leveraging centralized visibility and control of security policies and activities.

Flexible Central Administration

Vormetric Transparent Encryption from Thales eSecurity offers support for implementation in a range of Linux and Windows operating systems. All policy and encryption key administration is done through the Vormetric Data Security Manager, which can be deployed as a physical appliance or virtualized service, and either on or off premise, according to your objectives and environments.

인터액티브 동영상 시청하기(영문) 알아보기
라이브 데모 요청하기 요청하기
전문가와 상담하기 연락하기