Skip Navigation

Whether storing data-at-rest in a physical data center, a private or public cloud, or in a third-party storage application, proper encryption and key management are critical factors in ensuring sensitive data is protected.

Thales TCT offers federal agencies Thales Cloud Protect & Licensing's data encryption solutions that deliver granular encryption and role-based access control for structured and unstructured data residing in databases, applications, files, and storage containers. With centralized key management and a hardened root of trust, agencies can ensure their master keys are protected and data remains secure.

  • Benefits
    Simplicity

    Centralized policy and encryption key management to assure control of your data across every physical and virtual server on and off your premises.

    Minimize Risk

    Meet compliance and best practice requirements for protecting data from external threats or malicious insiders with proven, high-performance and scalable data encryption.

    Security Agility

    Quickly address new data security requirements and compliance mandates by having an encryption solution in place ready and able to encrypt everything.

  • Use Cases
    Database Security

    Encrypt data, control privileged user access, and collect security intelligence logs across your heterogeneous collection of database and big data environments with TCT data encryption security solutions.

    Compliance

    Data encryption, user and process access controls, logs, FIPS 140-2 and Common Criteria compliant key management, strong administration policies all contribute to effectively satisfying compliance mandates and regulation requirements.

    Cloud Security

    Confidently move workloads to the cloud and hosted environments knowing that your data remains in your control through data encryption and key management.

 

Data Encryption Solutions

Vormetric Data Security Platform

The Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across the organization. Learn More

Vormetric Data Security Manager

Physical and virtual appliances enable centralized, consistent management of encryption, access policies, and security intelligence. Learn More

Vormetric Transparent Encryption

Provides high-performance encryption and least-privileged access controls for files, directories, and volumes. Learn More

Live Data Transformation Extension

Extend Vormetric Transparent Encryption to enable the capability for encryption and key rotation without downtime. Learn More

Vormetric Container Security

Extend Vormetric Transparent Encryption encryption, privileged user access control, security intelligence log collection to your environment. Learn More

Vormetric Transparent Encryption for SAP HANA

Vormetric Transparent Encryption provides a proven approach to safeguarding SAP HANA data that meets rigorous security, data governance and compliance requirements. Learn More

Security Intelligence Logs

Detailed data access audit logs delivered by Vormetric Transparent Encryption for compliance, identification of unauthorized access attempts, and to build baselines of authorized user access patterns. Learn More

Vormetric Application Encryption

Easily add encryption into existing applications with standards-based APIs and centralized management. Learn More

Vormetric Protection for Teradata Database

Comprehensive, granular controls required to secure the most sensitive assets across your Teradata environments. Learn More

Vormetric Orchestrator

A virtual appliance to simplify the automation of deployment, configuration, management and monitoring of data encryption solutions. Learn More

ProtectV

Full disk encryption of physical servers, virtual machines, and cloud instances. Learn More

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept