0

Transparent
Encryption

Transparent Encryption continuously enforces file-level encryption that protects against unauthorized access by users and processes and creates detailed data access audit logs of all activities without requiring changes to applications, infrastructure, systems management tasks, or business practices.

Your Data is
Transparently Safe

Key Advantages of Transparent Encryption:

Continuously enforces file-level encryption that protects against unauthorized access by users and processes and creates detailed data access audit logs of all activities without requiring changes to applications, infrastructure, systems management tasks, or business practices.
Transparent Encryption agents are deployed on servers at the file system or volume-level and support both local disks as well as cloud storage environments, such as Amazon S3 and Azure Files.
Apply granular, least-privileged user access policies that protect data from external attacks and misuse by privileged users. Specific policies can be applied by users and groups from systems, LDAP/Active Directory, Hadoop and containers. Controls also include access by process, file type, time of day, and other parameters.
Transparent Encryption only employs strong, standard-based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and Elliptic Curve Cryptography (ECC) for key exchange. Encryption overhead is minimized using the AES hardware encryption capabilities available in modern CPUs.
Transparent Encryption agent is available for a broad selection of Windows, Linux, and AIX platforms, and can be used in physical, virtual, cloud, container, and big data environments, regardless of the underlying storage technology.
Live Data Transformation option eliminates the downtime required for initial encryption and scheduled rekeying operations. This patented technology allows for databases or files to be encrypted or re-keyed with a new encryption key while the data is in use without taking applications off-line.
SAP has qualified Transparent Encryption with HANA v2.0 to deliver data encryption, key management, privileged user access control, and granular file access audit logs.

Transparent encryption is an important component of a comprehensive data security strategy, particularly for organizations that store sensitive data in databases or file systems. It provides a strong layer of protection for data at rest, mitigating the risks associated with data breaches or unauthorized access to storage media.

Your Data is
Transparently Safe

Get Started

Experience
digital freedom
in a GO!

Get a demo

Giraffe

Connect
with us here