Software from SAP represents a core operational foundation for many of the world’s largest enterprises, powering such core applications as enterprise resource planning, data warehousing, materials management, and more.
However, as workloads and applications migrate to the cloud, traditional data center perimeter security measures are no longer sufficient to protect this sensitive data. A more secure approach is to encrypt mission-critical and private sensitive data, and to maintain data sovereignty through external encryption key management and ‘Bring Your Own Keys’ deployment strategies.
Thales and SAP now offer external, multi-cloud key lifecycle management for SAP applications. With the integration between SAP’s Data Custodian and the Thales CipherTrust Cloud Key Manager, organizations can seamlessly manage the encryption key life cycle of SAP applications from the same pane of glass as their other cloud encryption implementations.
By adding CipherTrust Cloud Key Manager, highly regulated customers can externally root their encryption keys in in support of Bring Your Own Keys (BYOK) data security policies.
Key features and benefits:
[Thales] facilitates the control of data, preventing access from people that might have the rights of access but not the privilege."
CipherTrust Transparent Encryption for SAP HANA enables enterprises to run high-volume/high-value data for mission-critical real-time applications in a manner that can be trusted whether on-premises or in the cloud. The solution provides greater control with separation of duties and policies for SAP HANA data encryption, with minimal administration.
Key features and benefits:
On the surface, encrypting the database instance using SAP native encryption would appear to be sufficient to protect data at rest within the SAP HANA database. But, enterprises storing sensitive data in an SAP HANA database need to consider exactly where in and around the database sensitive data might reside -- even outside the direct control of the Database Administrators (DBAs). To give an example, an SAP HANA database might encounter an error causing it to send information with sensitive data into a trace file or an alert log.
Encryption key lifecycle management for BYOK, HYOK and cloud native keys
Learn MoreQuickly secure data in SAP HANA environments, while ensuring applications continue to deliver optimal performance
Learn MoreGet in contact with an SAP Data Security specialist