Securing Unstructured Files

With Vormetric Transparent Encryption, file level encryption gives your IT organization a consistent and repeatable method for managing encryption, access policies and security intelligence for all structured and unstructured data

Securing Unstructured Files

Right now, sensitive and regulated data could be anywhere. Some file encryption options can help you secure data in specific systems, such as a particular kind of database. However, what happens if a spreadsheet that contains sensitive data is extracted from the database?

To establish strong protections, IT teams need a central encryption platform that can secure sensitive data wherever it resides—which is why so many organizations rely on the Vormetric Transparent Encryption file encryption system.

Securing Unstructured Files
Securing Unstructured Files

Unstructured files pose a unique challenge to the IT team, as they often contain sensitive data that requires the same protection as that found in structured databases. These files can reside in a range of databases, depending on the organization's requirements.

Vormetric Transparent Encryption

With Vormetric Transparent Encryption (VTE), your organization can secure unstructured files, wherever they reside - onsite or in the cloud. The VTE file encryption system allows you to secure sensitive data in spreadsheets, documents, presentations, images and more. Unlike other file encryption offerings, VTE enables security teams to implement file level encryption without having to make changes to the organization’s applications, infrastructure or business practices.

Persistent, Granular Controls

Vormetric Transparent Encryption’s file level encryption protection does not end after the encryption key is applied. The VTE file encryption system continues to enforce granular policies to protect against unauthorized access by users and processes, and it continues to log access. Policies can be applied by user, process, file type, time of day, and other parameters. With these capabilities, security teams can ensure continuous protection and control of their organization’s data.

Broad Environment Support

Vormetric Transparent Encryption offers support for file systems and storage architectures and it supports a broad range of operating systems, including Microsoft Windows, Linux, Oracle Solaris, IBM AIX, and HP-UX. The product can secure sensitive data in such databases as IBM DB2, Oracle, Microsoft SQL Server, MySQL, NoSQL, and Sybase.

Separation of Privileged Users and Sensitive User Data

The VTE file encryption system allows organizations to create a strong separation of duties between privileged administrators and data owners. The solution encrypts files while leaving their metadata in the clear. In this way, IT staff—including hypervisor, cloud, storage, and server administrators—can perform their system administration tasks, without being able to gain access to the sensitive data residing on the systems they manage.

Product Briefs : Vormetric Transparent Encryption

Vormetric Transparent Encryption delivers data-at-rest encryption, privileged user access controls and security intelligence logs to proactively meet compliance reporting requirements for structured databases and unstructured files. With Vormetric Transparent Encryption, IT and security professionals can efficiently safeguard more data, in more environments, and against more threats as sensitive data moves into cloud deployments, big data platforms, virtualized systems and more.


Research and Whitepapers : Protecting Sensitive Data In and Around an Oracle Database

The Protecting Sensitive Data In and Around an Oracle Database technical white paper provides an overview of the sensitive files in and around the Oracle database that enterprises need to secure in order to achieve optimal database security.

Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us