Securing Unstructured Files
Unstructured files pose a unique challenge to the IT team, as they often contain sensitive data that requires the same protection as that found in structured databases. These files can reside in a range of databases, depending on the organization's requirements.
Vormetric Transparent Encryption
With Vormetric Transparent Encryption (VTE), your organization can secure unstructured files, wherever they reside - onsite or in the cloud. The VTE file encryption system allows you to secure sensitive data in spreadsheets, documents, presentations, images and more. Unlike other file encryption offerings, VTE enables security teams to implement file level encryption without having to make changes to the organization’s applications, infrastructure or business practices.
Persistent, Granular Controls
Vormetric Transparent Encryption’s file level encryption protection does not end after the encryption key is applied. The VTE file encryption system continues to enforce granular policies to protect against unauthorized access by users and processes, and it continues to log access. Policies can be applied by user, process, file type, time of day, and other parameters. With these capabilities, security teams can ensure continuous protection and control of their organization’s data.
Broad Environment Support
Vormetric Transparent Encryption offers support for file systems and storage architectures and it supports a broad range of operating systems, including Microsoft Windows, Linux, Oracle Solaris, IBM AIX, and HP-UX. The product can secure sensitive data in such databases as IBM DB2, Oracle, Microsoft SQL Server, MySQL, NoSQL, and Sybase.
Separation of Privileged Users and Sensitive User Data
The VTE file encryption system allows organizations to create a strong separation of duties between privileged administrators and data owners. The solution encrypts files while leaving their metadata in the clear. In this way, IT staff—including hypervisor, cloud, storage, and server administrators—can perform their system administration tasks, without being able to gain access to the sensitive data residing on the systems they manage.