CipherTrust Data Security Platform
Discover, protect and control your organization’s sensitive data anywhere
with next-generation unified data protection.
Thales has pushed the innovation envelope with the CipherTrust Data Security Platform to remove complexity from data security, accelerate time to compliance, and secure cloud migrations. This next-generation platform is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together the best capabilities from the Vormetric Data Security Platform and KeySecure and connector products. CipherTrust Data Security Platform unifies data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in less resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced risk across your business.
The CipherTrust Data Security Platform is an integrated suite of data-centric security products and solutions that unify data discovery, protection and control in one platform.
A free-forever version of the CipherTrust Data Security Platform that makes it easy for DevSecOps to deploy data protection controls into hybrid and multi-cloud applications - in minutes instead of weeks. It supports the following DevSecOps use-cases.
Simplify Data Security
Discover, protect, and control your organization’s most sensitive data on-premises and in the cloud on an integrated data security platform.
Accelerate Time to Compliance
Comprehensive data security capabilities, including data discovery and classification, encryption, granular access controls, audit logs, tokenization, and key management support ubiquitous data security and privacy requirements.
Secure Cloud Migration
Confidently move workloads to the cloud and hosted environments, and repatriate data back on-premises, knowing that your data remains in your control.
Data protection techniques
Monitoring and reporting
Many organizations have attempted to cobble together specialized data security products from multiple vendors to address a broadening set of data security use cases. This approach is challenging since each product requires knowledge and experience to operate proficiently and...
451 Research examines Thales’s next-generation data protection platform to discover, protect and control sensitive data on a single platform. Uniting KeySecure and Vormetric product lines, CipherTrust Data Security Platform combines the strengths of both encryption and key...
Remote work, cloud apps and data are increasing Key Points/Stats from this Infographic: 79% of businesses remain concerned about the security risks of an increasingly remote workforce 56% know where their data is stored 25% could classify all their data
Traditionally organizations have focused IT security primarily on perimeter defense, building walls to block external threats from entering the network. However, with today’s proliferation of data, evolving global and regional privacy regulations, growth of cloud adoption, and...
As data breaches continue at alarming rates, securing sensitive data is critical to all organizations. In addition, organizations struggle to stay compliant with evolving global and regional privacy regulations, and securing the cloud in the face of accelerated adoption...
Thales has pushed the innovation envelope with the new CipherTrust Data Security Platform that unifies data discovery, classification, and data protection. It enables organizations to remove data security complexity, accelerate time to compliance, and secure cloud migrations....
To meet the scale of current and future data security threats, evolving global and regional privacy regulations, and cloud adoption brought on by remote working, organizations need an easier and unified approach to discover, protect and control their sensitive data. Thales...
The CipherTrust Data Security Platform (CDSP) increases data security, accelerates time to compliance, and secures cloud migration -- which decreases resources required for data security operations.
Data Protection Gateway (DPG) is a CipherTrust Connector that transparently protects sensitive data in RESTful calls in legacy and cloud-native applications without requiring code modifications. DPG offers Data Security teams full control over how data is protected and who has...
Discover the contents of this report as KuppingerCole rates all the market leaders in database and big data security solutions. With the average cost of a data breach reaching $4 million, companies face financial and reputational damages as well. High-profile “mega-breaches”...
The CipherTrust Data Security Platform integrates data discovery, classification, data protection and unprecedented granular access controls, all with centralized key management. Watch the demonstration of CipherTrust Data Security Platform in action!
CipherTrust Manager is the central management point for the CipherTrust Data Security Platform. Offers an industry leading enterprise key management solution to centrally manage encryption keys and configure security policies.
Enables organizations to get complete visibility into sensitive data with efficient data discovery, classification, and risk analysis.
Delivers high-performance encryption and least-privileged access controls for files, directories, and volumes.
Transparently protect data accessible from containers and containerized applications.
Delivers crypto functions such as key management, signing, hashing, and encryption services through APIs.
Transparently protect sensitive data in RESTful calls.
Quickly add tokenization and dynamic data masking to existing applications to protect data and meet regulations.
Delivers comprehensive encryption and granular controls to secure the most sensitive data across your database environments.
Transform data fast and easily for bulk encryption, initiate database tokenization, and create desensitized databases with static data masking.
CTE Ransomware Protection protects businesses against ransomware and unauthorized ransomware encryption by continuously monitoring processes for abnormal I/O activity.
Enables organizations to establish strong controls over encryption keys and policies for data encrypted by multiple cloud providers.
Supports a broad range of KMIP compatible devices and environments to comply with compliance standards and best practices with centralized encryption key management.
Provides lifecycle management for Oracle TDE Master Encryption Keys and Microsoft SQL Server database encryption keys to meet compliance and best practice requirements.