Vormetrics offers encryption, authentication and key management solutions to secure data in use, at rest and in transit across on-premises, cloud and big data environments. Its solutions use proven FIPS 140-2 certified algorithms to encrypt and decrypt data at the file, folder or database level ensuring full lifecycle data protection and security.

Enterprises are deploying data center applications and services in a wide variety of environments including traditional physical servers, virtual machines, containers and cloud. These new environments create opportunities for businesses to increase scalability, efficiency and productivity but also present increased security challenges. Vormetrics advanced data security capabilities ensure compliance, protect privacy and improve business performance.

For example, the Vormetric Transparent Encryption solution enables enterprises to encrypt sensitive data in use and at rest across on-premises, cloud, and big data environments – protecting it from hackers, insider threats and subpoenas. With centralized encryption key management and privileged user access control, organizations can stop compromised DBAs, hackers, cloud administrators, or authorities with subpoenas from accessing the valuable information they are after.

The Vormetric Data Security Manager (DSM) appliance combines transparent and continuous encryption, tokenization and masking with an integrated key management console to meet the requirements of nearly all compliance and data security standards and regulations. It is available as a FIPS 140-2 up to level 3 validated hardware or virtual appliance.

Another important feature of the product is its granular audit logging. It provides a comprehensive and detailed record of all file access activities, including root access. This logging is useful for compliance reporting, improving threat detection and providing an audit trail to help mitigate security incidents. The DSM also integrates with security information and event management (SIEM) systems to streamline compliance reporting and speed threat detection.

For those looking to securely move data across a variety of environments and platforms, the product offers two methods for transferring files: Copy Method and Data Transformation. The Copy Method transfers a file in its native format while the Data Transformation method encrypts the contents of the file on the fly as it is transferred to a target system.

Vormetrics also enables customers to deploy and scale their security implementations using RESTful APIs. This allows integration with orchestration and provisioning tools to simplify deployment and speed time to value.

Finally, Vormetrics recently announced a migration path from its legacy DSM to its next-generation CipherTrust Data Security Manager. It is important for current customers to understand that while this migration path offers a way to move to a single, centrally managed platform for delivering overall data security, it is a new product with a new command line, UI and functionally and will require staff training.

Lastly, for those who are not ready to take the plunge to migrate their entire security infrastructure to CipherTrust, there is an option called Managed Data Protection that can provide many of the same features as DSM without the need for hardware. This is a hosted service and is backed by a fleet of CipherTrust managers, which reduces complexity for the customer.