Employ Robust Data Security and Control in SAP Hana Environments

A proven approach for quickly securing data in SAP HANA environments, while ensuring applications continue to deliver optimal performance

Vormetric Transparent Encryption for SAP HANA

Vormetric Transparent Encryption provides a proven approach to safeguarding SAP HANA data that meets rigorous security, data governance and compliance requirements. The solution can be quickly deployed, requiring no changes to SAP HANA or the underlying database or hardware infrastructure. With the solution, organizations can encrypt SAP HANA data and log volumes, and establish strong governance and separation of duties.

VTE for SAP HANA is reviewed and qualified by SAP as suitable for use in SAP solution environments

  • Benefits
  • Features

Establish Strong Controls

Encrypt SAP Hana data and log volumes, enabling you to prevent privileged users from gaining unauthorized access to sensitive data.

Streamline Encryption Implementation

Encrypt sensitive assets in SAP Hana environments, without having to make any changes to SAP Hana or associated applications and infrastructure.

Retain Control in the Cloud

Encrypt data in cloud environments and other multi-tenant infrastructures, while retaining custodianship of encryption keys.

Centralized Policy and Key Management

Leverage the Vormetric Data Security Manager to establish robust, centralized control over encryption keys, security policies, and audit logs. Capture granular audit logs that support audits and compliance reporting. Logs can easily be integrated with SIEMs to foster improved intelligence, remediation, and controls.

Comprehensive Coverage

Apply encryption safeguards to structured and unstructured data. Establish safeguards in SAP HANA, associated databases, log and configuration files, and other files. Secure sensitive data across physical, virtual, and cloud environments.

Robust Controls

Establish auditable, granular controls to guard against abuse of privileged users and other internal staff. Implement well-defined, strong separation of duties between data and security administrators. Leverage a FIPS 140-2 Level 3 certified appliance.

  • Related Resources