VORMETRIC DATA SECURITY USE CASE

Similar documents
VORMETRIC CLOUD ENCRYPTION GATEWAY Enabling Security and Compliance of Sensitive Data in Cloud Storage

SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS

White Paper Big Data Without Big Headaches

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

Securing Sensitive Data within Amazon Web Services EC2 and EBS

Vormetric Encryption Architecture Overview

Case Studies: Protecting Sensitive Data in

Securing and protecting the organization s most sensitive data

BECAUSE DATA CAN T DEFEND ITSELF

Cloud Data Security. Sol Cates

HIPAA and HITECH Compliance Simplification. Sol Cates

2015 VORMETRIC INSIDER THREAT REPORT

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric

SafeNet DataSecure vs. Native Oracle Encryption

Debunking The Myths of Column-level Encryption

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

VORMETRIC DATA SECURITY PLATFORM ARCHITECTURE

Compliance for the Road Ahead

Securing Sensitive Data

Vormetric Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard

Preemptive security solutions for healthcare

8 Steps to Holistic Database Security

Security Trends and Client Approaches

Vormetric Data Security Platform Data Sheet

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

How To Achieve Pca Compliance With Redhat Enterprise Linux

Application Monitoring for SAP

PowerBroker for Windows

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

APT Protection Via Data-Centric Security. Alan Kessler President and CEO Vormetric

IT Security & Compliance. On Time. On Budget. On Demand.

Alliance Key Manager Solution Brief

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

How To Use Vormetric.Com To Protect Your Data From Hackers

Data Centric Security

Teradata and Protegrity High-Value Protection for High-Value Data

Using Encryption and Access Control for HIPAA Compliance

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Test Data Management for Security and Compliance

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

IBM Security Privileged Identity Manager helps prevent insider threats

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

CyberArk Privileged Threat Analytics. Solution Brief

SecureGRC TM - Cloud based SaaS

How To Manage A Privileged Account Management

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Enterprise Security Solutions

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

How To Protect Data From Attack On A Computer System

NCTA Cloud Architecture

Privilege Gone Wild: The State of Privileged Account Management in 2015

Securely Outsourcing to the Cloud: Five Key Questions to Ask

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

HiSoftware Policy Sheriff. SP HiSoftware Security Sheriff SP. Content-aware. Compliance and Security Solutions for. Microsoft SharePoint

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Feature. Log Management: A Pragmatic Approach to PCI DSS

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

Cloud Security Who do you trust?

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

content-aware identity & access management in a virtual environment

Privacy in the Cloud A Microsoft Perspective

Data-Centric Security vs. Database-Level Security

Securing Oracle E-Business Suite in the Cloud

Encryption, Key Management, and Consolidation in Today s Data Center

Privilege Gone Wild: The State of Privileged Account Management in 2015

An Oracle White Paper January Oracle Database Firewall

How To Protect Your Organization From Insider Threats

Cloud Data Security and the Insider Threat

Windows Least Privilege Management and Beyond

Protecting Data at Rest with Vormetric Data Security Expert

NEC Managed Security Services

PCI Compliance for Cloud Applications

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Encryption Key Management for Microsoft SQL Server 2008/2014

Enforcive / Enterprise Security

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

PowerBroker for Windows Desktop and Server Use Cases February 2014

Vormetric Addendum to VMware Product Applicability Guide

Top 10 Reasons You Need Encryption

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

PATCH MANAGER what does it do?

Accelerating Insurance Legacy Modernization

The Education Fellowship Finance Centralisation IT Security Strategy

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Cloud Security Who do you trust?

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

An Oracle White Paper January Oracle Database Firewall

Privileged User Monitoring for SOX Compliance

Data Masking. Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems. brochure

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Vormetric Data Security Securing and Controlling Data in the Cloud

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Transcription:

VORMETRIC DATA SECURITY USE CASE Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732 United Kingdom: +44.118.949.7711 South Korea: +82.2.2190.3830 info@vormetric.com www.vormetric.com

A single, extensible solution that helps organizations prevent breaches, protect data, meet compliance requirements, and gain valuable security intelligence across physical, virtual, cloud and big data environments As enterprises generate larger amounts of data, and continue their journey to the cloud, they face the growing challenge of protecting and controlling access to accumulated volumes and varieties of sensitive data. Sensitive data like customer information, intellectual property and financial data are extremely valuable commodities that are attractive targets requiring data-centric protection from both a security and compliance perspective. Security has changed. Given permeable perimeters, advanced cybercrime techniques, the insider threat and ever evolving compliance requirements, enterprises need to reduce their attack surface, secure their vital assets and limit access to sensitive information. Vormetric Data Security protects your most critical asset from security breaches and compliance threats by implementing access policies with fine-grained controls, deploying advanced encryption, leveraging key management and vaulting technologies to lock down and change the state of the data, and continuously gathering security intelligence to identify any emerging issues in real-time. Vormetric provides transparent, strong, efficient data protection that is easy to deploy and manage while avoiding the need to modify applications or storage infrastructure and can be deployed across heterogeneous environments. Solutions in each area: Safeguard sensitive information from data breaches Support compliance and regulatory requirements Enable organizations to meet requirements for data protection from customers and partners DATA PROTECTION Vormetric Data Security provides a single platform that extends across the enterprise to provide data security and operational efficiency in a variety of use cases. Database (Structured) Security Vormetric Data Security protects databases and can encrypt and control access to databases in any environment physical, virtual and cloud. Vormetric Key Management stores and manages encryption keys for Transparent Data Encryption (TDE) for Oracle, IBM DB2, Microsoft SQL Server, MySQL, Sybase, NoSQL environments, or any combination thereof. Unstructured Data Security Vormetric Encryption enables enterprises to meet requirements to secure and control access to unstructured data including pdf files, spreadsheets, word documents, presentations, graphics, and more. Transition to the Cloud To leverage cloud resources (including IaaS such as AWS, Azure, FireHost and IBM: SaaS such as Box & S3). While meeting your enterprise cloud security and compliance requirements, you need robust, persistent, and granular controls that can be applied whether data is in your internal data center or at your cloud provider s facilities. Virtual Environment Security Vormetric Transparent Encryption delivers the security capabilities you need to safeguard your sensitive assets. Whether you re running VMware, Microsoft Hyper-V, KVM (Kernel-based Virtual Machine), or any other standard virtualization platform, Vormetric can help you address your critical security requirements, with unparalleled efficiency and low cost of ownership.

Big Data Security Vormetric solutions enable organizations to maximize the benefits of big data analytics without risking the security sensitive data. The Vormetric Data Security Platform offers the capabilities that organizations need to secure sensitive data across big data environments including big source data sets, big data infrastructure, and big data analytics results. We are fully integrated with most Big Data partners so you will never be a BETA customer with your Big Data deployment. Super User/Administrator Credentials Abuse Vormetric Encryption encrypts and controls access to data for commercial-off-the-shelf applications as well as legacy applications so that enterprises can meet security obligations without disrupting operations. Vormetric Key Management enables custom applications to take advantage of cryptographic services to secure application data and meet enterprise security requirements. Protection From Rogue Insiders User Access Controls reduce the enterprise risk profile by controlling privileged system users such as root or system administrators, allowing them to do their jobs without having access to protected information. Intellectual Property Protection Compromised intellectual property can have catastrophic business consequences. Vormetric encrypts and controls access to intellectual property, from design diagrams to databases to reduce the enterprise risk profile. Outsourcing & Contractual Obligations Service providers handling sensitive data frequently have to demonstrate that client data is protected. Vormetric Data Security encrypts, controls access, and reports on access to meet contractual obligations. Facilitating Repair & Disposal of Storage Hardware Disposing of servers and storage containing sensitive data can be a costly exercise for many enterprises. Vormetric Data Security enables enterprises to cryptographically shred information and avoid expensive equipment disposal costs. Mitigating Advanced Persistent Threat (APT) Risk Vormetric Data Security reduces the attack surface by protecting data and controlling access to data targeted by APTs. It also helps provide security intelligence by communicating unauthorized access attempts and unusual access patterns. Secured Data Management and Control Centralize keys and certificates on KMIP compliant devices. Vormetric Key Management enables enterprises to store, report and alert on certificates and other security materials to maintain application uptime and minimize SSL management costs. NAS Security Organizations can institute strong, comprehensive protections around the sensitive assets that are stored in NAS environments. CORE PRODUCT TECHNOLOGIES The Vormetric Data Security Platform makes it efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, the Vormetric Data Security Platform features several products that can be deployed individually or together. Through the platform s centralized key management and flexible implementation, you can address security policies and compliance mandates across databases, files, and big data environments whether assets are located in the cloud, virtual or traditional infrastructures. With this platform s comprehensive, unified capabilities, you can efficiently scale to address your expanding security and compliance requirements, while significantly reducing total cost of ownership (TCO).

Transparent Encryption Enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure. Tokenization With Dynamic Data Masking Helps security teams address its compliance objectives while gaining breakthroughs in operational efficiency. Remove databases from PCI DSS audit scope with minimal disruption and administrative overhead. By ensuring persistent security controls over data, no matter where it resides, Vormetric Tokenization enables organizations to fully leverage cloud services, big data analytics, and outsourced environments. Cloud Encryption Gateway Organizations can safeguard files in cloud storage environments, including Amazon Simple Storage Service (Amazon S3) and Box. The cloud security gateway solution encrypts sensitive data before it is saved to the cloud storage environment, enabling security teams to establish the visibility and control they need around sensitive assets. Application Encryption Simplifies integrating application-level encryption into existing corporate applications. The application encryption library provides a set of documented standard-based APIs used to perform cryptographic and encryption key management operations. Vormetric Application Encryption removes the complexity and risk of implementing an in-house encryption and key management solution. Security Intelligence Works with SIEM vendors to accelerate behind the perimeter threat detection and produces detailed file access and security information logs for auditors and compliance officers. Key Management Delivers consistent policy implementation between systems, reduces training and maintenance costs. COMPLIANCE MANDATES Lawmakers and regulators around the world are enhancing existing compliance requirements, implementing new legal frameworks and defining new data security regulations. Vormetric Data Security provides the data protection functionality required to adhere to global compliance requirements. Compliance Scope With data masking and tokenization, remove data and servers from audit scope by securing data and the servers they reside on with minimum disruption and overhead. Payment Card Industry Data Security Standard (PCI DSS) Vormetric Data Security helps enterprises comply with PCI DSS requirements 3, 7 and 10 that call for the protection of cardholder information. Vormetric Data Security secures cardholder data in databases as well as voice files, reports, and images. HIPAA/HITECH Electronic Patient Health Information (ephi) needs to have access controls and be secured to maintain compliance with HIPAA/HITECH. Whether unstructured medical imagery or structured database information containing ephi, Vormetric secures and controls access to ephi. FDA Title 21 CFR Part 11 Encryption for stored information relevant to drug manufacturing & distribution. Financial Services/Government Vormetric Data Security enables enterprises such as financial services (Chinese Walls) and governments to meet data governance mandates by segregating data repositories so that departments or entities can only see data they own and not adjacent data. State Data Breach Notification Laws US states have data breach notification laws modeled on California SB 1386 that provides a safe harbor in the event of a breach where the underlying data is encrypted. Vormetric Encryption provides safe harbor and helps businesses avoid the cost and brand damage that comes with breach notification.

National Data Protection Laws Nations around the globe are instituting data protection laws which mandate encrypting citizen personal information including UK Data Protection Act, EU Data Protection Directive and South Korea s Personal Information Protection Act. Vormetric Data Security secures personal information, be it structured (in databases) or unstructured data. Sarbanes-Oxley, Euro-Sox GLBA, Basel II & III Vormetric Data Security provides security, key management, access control and reporting so enterprises can demonstrate effective controls over sensitive information. Data Residency/Data Sovereignty With over 50, highly varied, national privacy laws in effect worldwide enterprises, cloud providers and multi-nationals need to ensure that data does not inappropriately cross legal jurisdictions. Vormetric Data Security enables segregation and control of data access to meet their legal obligations in many cases without changes to applications and infrastructure. In addition numerous other compliance regimes mandate protection of data-at-rest that can be enabled with Vormetric. These include FedRAMP/NIST 800-53 requirements for US Federal agencies, FIPS 140-2 for security management environments, the Australia Privacy Act, the EU Data Protection Act, South Korea s PIPA and Singapore s MAS TRM. ABOUT VORMETRIC Vormetric (@Vormetric) is the industry leader in data security solutions that span physical, virtual and cloud environments. Data is the new currency and Vormetric helps over 1,400 customers, including 17 of the Fortune 30 and many of the world s most security conscious government organizations, to meet compliance requirements and protect what matters their sensitive data from both internal and external threats. The company s scalable Vormetric Data Security Platform protects any file, any database and any application anywhere it resides with a high performance, market-leading data security platform that incorporates application transparent encryption, privileged user access controls, automation and security intelligence. For more information, please visit: www.vormetric.com. Copyright 2015 Vormetric, Inc. All rights reserved. Vormetric is a registered trademark of Vormetric, Inc. All other trademarks are the property of their respective owners. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, photocopying, recording or otherwise, without prior written consent of Vormetric.