Container technologies bring unprecedented benefits to organizations but with risks. CipherTrust Transparent Encryption Container Security delivers critical encryption, access controls, and data access audit logging that enable organizations to meet compliance, regulatory, and best practice requirements for safeguarding data within dynamic container environments.
Containers often run with root-level systems permissions (for Docker, by default – elsewhere, when specifically enabled), resulting in administrators having full access to container images and system data. CipherTrust Transparent Encryption Container Security with data access controls enables privileged users, such as Docker or OpenShift cluster administrators, to work as usual without exposing sensitive information.
Prevent Privileged User Abuse
CipherTrust Transparent Encryption Container Security offers encryption with data access control, preventing privileged users, such as Docker or OpenShift cluster administrators, to work as usual without having access to sensitive information.
Maximize Container Advantages, Minimize Risk
CipherTrust Transparent Encryption Container Security enforces data security policies in OpenShift or Docker dynamic container environments -- even in the cloud. This lets your organization maximize the benefits of using containers in any environment without compromising data security.
Address Compliance Requirements
CipherTrust Transparent Encryption Container Security addresses the data access control requirements of pertinent government and industry regulatory mandates -- whether you manage payment cards, healthcare records, or other sensitive assets.
Comprehensive Data Security Safeguards
CipherTrust Transparent Encryption Container Security extends CipherTrust Transparent Encryption, letting security teams establish data security controls inside containers. With this extension, you can apply encryption, access control, and data access logging on a per-container basis. Encryption can be applied to data generated and stored locally within the container and to data mounted in the container by network file systems.
Granular Controls and Visibility
CipherTrust Transparent Encryption Container Security offers the detailed visibility and control you need to comply with the most stringent data security policies and mandates. Enterprises can establish granular access policies based on specific users, processes, and resource sets within containers. This solution can also isolate containers, so only authorized containers can access sensitive information.
No Changes to Container Environments
CipherTrust Transparent Encryption Container Security lets your enterprise establish data security controls without having to make any changes to applications, containers, or infrastructure sets. The container security solution even supports common container microservices deployment models, enabling single policies that can apply to all containers running on a container host instance and allowing distinct policies for each container or a mix of policy types.
Requires Vormetric Transparent Encryption as a prerequisite