CipherTrust Transparent Encryption (formally known as Vormetric Transparent Encryption) delivers data-at-rest encryption with centralized key management, privileged user access control and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data, and container environments.
The deployment is simple, scalable and fast, with agents installed at operating file-system or device layer, and encryption and decryption is transparent to all applications that run above it. CipherTrust Transparent Encryption is designed to meet data security compliance and best practice requirements with minimal disruption, effort, and cost. Implementation of the server encryption software is seamless keeping both business and operational processes working without changes even during deployment and roll out. The server encryption solution works in conjunction with the FIPS 140-2 up to Level 3 validated CipherTrust Manager, which centralizes encryption key and policy management for the CipherTrust Data Security Platform.
CipherTrust Transparent Encryption from Thales CPL is available for sale to the U.S. Federal Government exclusively through Thales TCT.
Transparent Data Protection
Transparent and continuous file-level encryption that protects against unauthorized access by users and processes in physical, virtual, and cloud environments. Transparent file encryption implementation is seamless and fast, keeping both business and operational processes working without changes even during deployment and roll out.
Scalable and Easy to Deploy
Scaling to deployments of tens of thousands of physical or virtual servers, CipherTrust Transparent Encryption is available for Windows, Linux, and Unix platforms. The enterprise encryption software can be used, deployed and maintained across physical, cloud, container and big data environments.
Meet Compliance and Best Practice Requirements
Encryption, access controls and data access logging are basic requirements or recommended best practices for almost all compliance and data privacy standards and mandates, including PCI DSS, HIPAA/Hitech, GDPR and many others.
Define Granular Access Controls
Role-based access policies control who, what, where, when and how data can be accessed. Access controls are available for system level users and groups as well as LDAP, Active Directory, Hadoop and Container users and groups. Easily implement privileged user access controls to enable administrators to work as usual, but protect against users and groups that are potential threats to data
High-Performance Hardware Accelerated Encryption
Transparent Encryption only employs strong, standard-based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and elliptic curve cryptography (ECC) for key exchange. The agent is FIPS 140-2 Level 1 validated. The overhead from encryption is minimized using the encryption capabilities available in modern CPUs. A distributed agent-based deployment model eliminates the bottlenecks and latency that plague legacy proxy-based encryption solutions.
Broadest Operating System and Environment Support
Secure structured databases and unstructured files across data centers, cloud, containers and big data environments on Linux, Windows and Unix with a single infrastructure and management environment. Encryption, access control and data access audit logging are available without changes to infrastructure, applications or workflow for maximum control with minimal costs and resource requirements.
Comprehensive Security Intelligence.
Identify and stop threats faster with detailed data access audit logs that not only satisfy compliance and forensic reporting requirements, but also enable data security analytics. Pre-built integration and dashboards that make it easy to find denied-access attempts to protected data are available for major system vendors.
Zero-Downtime Data Transformation
Eliminate the downtime required for initial encryption operations by adding the Live Data Transformation option. This patented technology allows for databases or files to be encrypted or re-keyed with a new encryption key while the data is in use without taking applications off-line. There is no other data encryption solution that offers this unique capability.
Microsoft—Windows Server 2019, 2016 and 2012; Linux—Red Hat Enterprise Linux (RHEL), SuSE Linux Enterprise Server, and Ubuntu; UNIX—IBM AIX.
IBM DB2, MySQL, NoSQL, Oracle, SQL Server, Sybase, and others
Transparent to all applications, including Microsoft, Documentum, SAP, SharePoint, custom applications, and more
Big data support:
Hadoop—Cloudera, Hortonworks, IBM; NoSQL—Couchbase, DataStax, MongoDB; SAP HANA; Teradata
Encryption hardware acceleration:
AMD and Intel AES-NI, IBM P9 cryptographic coprocessor
FIPS 140-2 Level 1
Docker, Red Hat OpenShift
AWS: EBS, EFS, S3, S3I, S3 Glacier
AZURE: Disk Storage, Azure Files
CipherTrust Transparent Encryption Product Brief
Product overview with technical features and specifications.
CipherTrust Live Data Transformation Product Brief
Product overview with technical features and specifications.
Prevent Ransomware Attacks from Disrupting Your Agency with CipherTrust Data Security Platform White Paper
This white paper helps you understand the anatomy of ransomware attacks and explores the solutions available in the market today to defend against such attacks. It illustrates how security policies in CipherTrust Transparent Encryption from Thales enable you to prevent rogue processes and unauthorized users from encrypting your most sensitive data and thereby protects you from ransomware attacks.
CipherTrust Transparent Encryption White Paper
CipherTrust Transparent Encryption enables quick, effective and transparent protection of data at the system level without derailing processes, user tasks, and administrative workflows. With a single set of data security controls, information stored within physical and virtual systems, big data environments, containers, and linked cloud storage are protected at the file system or volume level across data centers and cloud environments. The result is greatly reduced risk, and an enhanced capability to meet compliance and regulatory data security requirements.