Thales banner

Transparent encryption

Advanced Data-at-Rest Encryption, Access Control and Data Access Audit Logging

Get in Touch

Cyber Security Excellence Award

Meet compliance and best practice requirements for encryption, access control and data access logging using a proven hardware-accelerated encryption solution that secures files, volumes and linked cloud storage, in physical, virtual and cloud environments.

CipherTrust Transparent encryption

CipherTrust transparent encryption (formerly known as Vormetric transparent encryption) delivers data-at-rest encryption with centralised key management, privileged user access control and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data and container environments.

The deployment is simple, scalable and fast, with agents installed at operating file-system or device layer; encryption and decryption is transparent to all applications that run above it. CipherTrust transparent encryption is designed to meet data security compliance and best practice requirements with minimal disruption, effort and cost. The implementation is seamless and keeps both business and operational processes working without changes even during deployment and roll out. The solution works in conjunction with the FIPS 140-2 up to Level 3 compliant CipherTrust Manager, which centralises encryption key and policy management for the CipherTrust data security platform.

CipherTrust transparent encryption

2024 Thales Data Threat Report

Global Edition

2024 Thales Data Threat Report

Read more about Navigating New Threats and Overcoming Old Challenges


Get Your Copy Today
  • Benefits
  • Features
  • Specifications

Transparent Data Protection

Transparent and continuous file-level encryption that protects against unauthorised access by users and processes in physical, virtual and cloud environments. Implementation is seamless and fast, keeping both business and operational processes working without changes even during deployment and roll out.

Scalable and easy to deploy

Scaling to deployments of tens of thousands of physical or virtual servers, the CipherTrust transparent encryption solution is available for Windows, Linux and Unix platforms. The enterprise encryption software can be used, deployed and maintained across physical, cloud and big data environments.

Meet Compliance and Best Practice Requirements

Encryption, access controls and data access logging are basic requirements or recommended best practices for almost all compliance and data privacy standards and mandates, including PCI DSS, HIPAA, GDPR and many others.

Define Granular Access Controls

Role-based access policies control who, what, where, when and how data can be accessed. Access controls are available for system level users and groups as well as LDAP, Active Directory, Hadoop and Container users and groups. Easily implement privileged user access controls to enable administrators to work as usual, but protect against users and groups that are potential threats to data

High-Performance Hardware Accelerated Encryption

Transparent encryption only employs strong, standard-based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and elliptic curve cryptography (ECC) for key exchange. The agent is FIPS 140-2 Level 1 validated. The overhead from encryption is minimised using the encryption capabilities available in modern CPUs. A distributed agent-based deployment model eliminates the bottlenecks and latency that plague legacy proxy-based encryption solutions.

Broadest Operating System and Environment Support

Secure structured databases and unstructured files across data centres, cloud, containers and big data environments on Linux, Windows and Unix with a single infrastructure and management environment. Encryption, access control and data access audit logging are available without changes to infrastructure, applications or workflow for maximum control with minimal costs and resource requirements.

Comprehensive Security Intelligence

Identify and stop threats faster with detailed data access audit logs that not only satisfy compliance and forensic reporting requirements, but also enable data security analytics. Pre-built integration and dashboards that make it easy to find denied-access attempts to protected data are available for major system vendors.

Zero-Downtime Data Transformation

Eliminate the downtime required for initial encryption operations by adding the Live Data Transformation option. This patented technology allows for databases or files to be encrypted or re-keyed with a new encryption key while the data is in use without taking applications offline. There is no other data encryption solution that offers this unique capability.

Platform support:

Microsoft – Windows Server 2019, 2016 and 2012; Linux – Red Hat Enterprise Linux (RHEL), SuSE Linux Enterprise Server and Ubuntu; UNIX – IBM AIX.

Database support:

IBM DB2, MySQL, NoSQL, Oracle, SQL Server, Sybase and others

Application support:

Transparent to all applications, including Microsoft, Documentum, SAP, SharePoint, custom applications, and more

Big data support:

Hadoop – Cloudera, Hortonworks, IBM; NoSQL – Couchbase, DataStax, MongoDB; SAP HANA; Teradata

Encryption hardware acceleration:

AMD and Intel AES-NI, IBM P9 cryptographic coprocessor

Agent certification:

FIPS 140-2 Level 1

Cloud support:

AWS: EBS, EFS, S3, S3I, S3 Glacier

AZURE: Disk Storage, Azure Files

Related resources

Top 10 reasons CipherTrust  Transparent Encryption protects your  data, wherever it resides - Brochure

Top 10 reasons CipherTrust Transparent Encryption protects your data, wherever it resides - Brochure

The volume of data that your organization is using and storing has likely grown significantly in the past year alone. Compliance with the numerous regional and global privacy laws and regulations is getting more complex and challenging. Every day brings reports of new data...

CipherTrust Transparent Encryption - White Paper

CipherTrust Transparent Encryption - White Paper

Enterprise digital transformation and increasingly sophisticated IT security threats have resulted in a progressively more dangerous environment for enterprises with sensitive data, even as compliance and regulatory requirements for sensitive data protection rise. With attacks...

CipherTrust Transparent Encryption - Product Brief

CipherTrust Transparent Encryption - Product Brief

Safeguarding sensitive data requires much more than just securing a data center’s on-premises databases and files. The typical enterprise today uses three or more IaaS or PaaS providers, along with fifty or more SaaS applications, big data environments, container technologies,...

CipherTrust Live Data Transformation – Product Brief

CipherTrust Live Data Transformation – Product Brief

CipherTrust Live Data Transformation delivers patented capabilities for deploying and maintaining encryption without downtime and seamless, non-disruptive key rotation. Learn more. 

Advanced data protection for Amazon S3 with CipherTrust Transparent Encryption - Solution Brief

Advanced data protection for Amazon S3 with CipherTrust Transparent Encryption - Solution Brief

Amazon Simple Storage Service (S3), is one of the leading cloud storage solutions used by companies all over the world to power their IT operations for a variety of use-cases. Amazon S3 buckets have become one of the most commonly used cloud storage repositories for everything...

Avoiding Amazon S3 Thumb

Avoiding Amazon S3 Data Leaks with Scalable Encryption and Access Controls - White Paper

Cloud computing is transforming the way enterprises, government agencies, and small businesses manage their company data. Amazon Simple Storage Service (S3), one of the leading cloud storage solutions, is used by companies all over the world to power their IT operations for a...

Database and Big Data Security - Report

Database and Big Data Security - KuppingerCole Report

Discover the contents of this report as KuppingerCole rates all the market leaders in database and big data security solutions.  With the average cost of a data breach reaching $4 million, companies face financial and reputational damages as well. High-profile “mega...

CipherTrust transparent encryption for Amazon S3 – video

CipherTrust transparent encryption for Amazon S3 – video

Watch this short video to learn how CipherTrust transparent encryption makes it easy to secure sensitive data stored in Amazon S3 buckets with transparent encryption, privileged user access controls and data access audit logging.