We offer data-at-rest encryption solutions that deliver granular encryption, tokenization and role-based access control for structured and unstructured data residing in databases, applications, files, and storage containers. With centralized key management and a hardened root of trust, enterprises can ensure their master keys are protected and data remains secure.
Operational Simplicity: Centralized policy and encryption key management assure control of your data across every physical and virtual server on and off your premises.
Minimize Risk: Meet compliance and best practice requirements for protecting data from external threats or malicious insiders with proven, high-performance, and scalable data encryption.
Security Agility: Quickly address new data security requirements and compliance mandates by having a solution in place ready and able to protect all sensitive data.
Compliance: Data encryption, user and process access controls, data access logs, FIPS 140-2 compliant key management, and strong administration policies all contribute to satisfying compliance mandates and regulatory requirements.
Cloud Security: Confidently move workloads to the cloud and hosted environments knowing that your data remains in your control through data protection and key management inaccessible to cloud providers.
Database Security: Encrypt data, control privileged user and database administrator access, and collect security intelligence logs across your heterogeneous collection of database and big data environments with Our data-at-rest encryption security solutions.
How Encryption works:
Symmetric vs. Asymmetric Key Systems
Complex algorithms, or sets of rules, are used to scramble the data being sent from plaintext into ciphertext. Once received, the data can then be decrypted only by using the key provided by the message originator.
Cryptographic key systems are essential to encryption technology. The two primary systems are symmetric and asymmetric.
Symmetric key system: Also known as a “secret” key system, an asymmetric key system requires all parties have the same key. The same key can be used to both encrypt and decrypt messages and must be kept secret or the security of the messaging is compromised. For all parties to have the same key, there must be a way to securely distribute the key. While this can be done, the security controls needed can make this system quite impractical for widespread and commercial use on an open network, like the Internet.
Asymmetric key system: This system, also known as a public/private key system, solves the distribution problem inherent in the symmetric key system. In this system, two keys are used. One key is kept secret, or “private,” while the other key is made widely available to anyone needing it and is referred to as the “public” key. Both the public and private keys are mathematically related so that information encrypted with the public key can only be decrypted by the corresponding private key.