US Federal Government Cyber Security and Data Protection

Vormetric Data Encryption Solutions help Federal Government Agencies and the firms who work with them protect sensitive information and prevent data security breaches

Federal Government

During Fiscal Year 2015, US-CERT processed more than 75,000 cybersecurity incidents reported by CFO Act government agencies, up from the more than 67,000 incidents reported in FY 2014, and the White House has made cybersecurity a top government-wide priority.

US Federal Government Cyber Security and Data Protection
Insider Threats

Insider-implemented breaches, such as those by Edward Snowden and Bradley Manning can not only severely cripple the ability of Federal agencies to achieve their objectives, but can also have a chilling effect on Federal professional and administrative careers.

Stolen Credentials

While insider threats persist, external threats are becoming more menacing and sophisticated. Advanced persistent threats, or APTs, blur the line between insider and external threats by allowing external adversaries to steal the user credentials required to bypass perimeter defenses and act as insiders. Due to their sophistication and required resources, APTs are often attributed to nation-states and other highly organized entities.

The Need for Compliance

As cybersecurity threats have proliferated and computer technology has advanced, government data security compliance has become increasingly complex.

The government mandates encryption, and major government security compliance regulations such as FISMA, NIST 800-53, FIPS (up to level 3), and Common Criteria need to be part of the any government data-security solution. And, as data moves to the cloud, government agencies need to comply with FedRAMP. Finally, depending on the government agency, HIPAA-HITECH and PCI DSS may also be important.

The Thales eSecurity Solution

Vormetric’s data security solutions address all these issues and truly secure sensitive data for Federal government agencies working in the Civilian, Defense and Intelligence sectors through enabling an enterprise-level data at rest security strategy that is:

  • Effective
  • Highly compliant to government mandates
  • Quick to install
  • Easy to use
  • Easy to scale
  • Cost effective
Our Customer List

Thales eSecurity provides government data security solutions to members of the US Intelligence Community, The U.S. National Laboratories, Health and Human Services and many other U.S. Federal Agencies and Departments.

Seventeen of the Fortune 30 rely on Thales eSecurity’s data security technology as do more than 1,500 customers in 22 countries across a broad range of industries including healthcare, retail, consumer goods, manufacturing, banking, insurance and cloud service providers. And, industry partners including IBM and Symantec market OEM solutions that incorporate Vormetric product technology.

Research and Whitepapers : Addressing continuous diagnostics and mitigation requirements

Congress established the Continuous Diagnostics and Mitigation program (CDM) to provide a strong, consistent cyber defense designed to protect more than 70 civilian agency networks. With the Vormetric data Security Platform, agencies can take a comprehensive, organization-wide approach to protecting data in support of CDM. The platform offers a number of capabilities that either comply with or exceed CDM requirements including:

  • Encryption and key management
  • Access controls
  • Multi-tenant support
  • Privileged user controls
  • Security intelligence

Download this paper to learn more about these capabilities and how they directly map to CDM requirements.

Download

Research and Whitepapers : The Enterprise Encryption Blueprint

Download this white paper to be set in the right direction to discover, define and deploy the enterprise data encryption strategy that is best for your organization.

Download

Solution Brief : Secure Multi-Tenancy

Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers and secure enclaves. Each customer is called a tenant.* Customers use it to gain investment efficiencies, secure stability, and isolation of security zones within a single High Availability architecture.

Download

Research and Whitepapers : FedRAMP Certification of your CSP Does Not Protect your Data in the Cloud

Using the services of a CSP that is FedRAMP-certified does not guarantee that the data placed with that CSP will be encrypted, secured, or otherwise protected...

Download

Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us