Vormetric Transparent Encryption with LDT and Quickstart On-boarding (12-month term commit)
The Vormetric Transparent Encryption solution enables your organization to meet security and compliance mandates and manage risks by encrypting data at rest at the file system or volume level. Vormetric Transparent Encryption delivers high performance, granular access policies and security intelligence.
The Vormetric Data Security Manager (DSM) provides centralized encryption key provisioning for the Vormetric Transparent Encryption solution. Centralizing control of such a breadth of security capabilities lowers total cost of ownership, enables efficient deployment of new security services and increases control and visibility of data across your organization.
Simplify training, deployment, and operations with centralized management of data security policies and key management. Manage your solution via a Web-based console, command line interface (CLI) or a RESTful API. Strong separation of duties ensures that a single administrator does not have complete control over the data security policies, encryption keys, and DSM administration.
This offering includes the following:
The Vormetric DSM Bundle includes the Vormetric Data Security Manager (DSM) server, deployed as a stand-alone virtual appliance (Linux), licensed for the desired number of Encryption Agents (Windows or Linux). Note: All Agents include Live Data Transformation (LDT) support.
The Vormetric Standard Quickstart On-boarding is a defined professional services engagement with the CenturyLink Cloud On-boarding Team to accelerate your success by providing a 90-day engagement, comprised of training, implementation assistance, and a consultative framework to ensure you are successful with your Vormetric solution. This engagement includes tailored and specific topics such as: DSM clustering, data security policies overview, key management, architectural considerations, among others.
The Encryption Agents can be installed manually or via the Vormetric Encryption Agent Marketplace tile. Although this Vormetric DSM Bundle includes the license to support the desired number of Vormetric Encryption Agents, they must be deployed separately.
Vormetric Data Security protects databases and can encrypt and control access to databases in any environment – physical, virtual and cloud. Vormetric Key Management stores and manages encryption keys for Transparent Data Encryption (TDE) for Oracle, IBM DB2, Microsoft SQL Server, MySQL, Sybase, NoSQL environments, or any combination thereof.
Vormetric Encryption enables enterprises to meet requirements to secure and control access to unstructured data including pdf files, spreadsheets, word documents, presentations, graphics, and more.
Vormetric Transparent Encryption delivers the security capabilities you need to safeguard your sensitive assets. Whether you’re running VMware, Microsoft Hyper-V, KVM (Kernel-based Virtual Machine), or any other standard virtualization platform, Vormetric can help you address your critical security requirements, with unparalleled efficiency and low cost of ownership.
Vormetric solutions enable organizations to maximize the benefits of big data analytics without risking the security sensitive data. The Vormetric Data Security Platform offers the capabilities that organizations need to secure sensitive data across big data environments—including big source data sets, big data infrastructure, and big data analytics results. We are fully integrated with most Big Data partners so you will never be a “BETA customer” with your Big Data deployment.
Vormetric Encryption encrypts and controls access to data for commercial-off-the-shelf applications as well as legacy applications so that enterprises can meet security obligations without disrupting operations. Vormetric Key Management enables custom applications to take advantage of cryptographic services to secure application data and meet enterprise security requirements.
User Access Controls reduce the enterprise risk profile by controlling privileged system users such as root or system administrators, allowing them to do their jobs without having access to protected information.
Compromised intellectual property can have catastrophic business consequences. Vormetric encrypts and controls access to intellectual property, from design diagrams to databases to reduce the enterprise risk profile.
Service providers handling sensitive data frequently have to demonstrate that client data is protected. Vormetric Data Security encrypts, controls access, and reports on access to meet contractual obligations.
Disposing of servers and storage containing sensitive data can be a costly exercise for many enterprises. Vormetric Data Security enables enterprises to cryptographically shred information and avoid expensive equipment disposal costs.
Vormetric Data Security reduces the attack surface by protecting data and controlling access to data targeted by APTs. It also helps provide security intelligence by communicating unauthorized access attempts and unusual access patterns.
Centralize keys and certificates on KMIP compliant devices. Vormetric Key Management enables enterprises to store, report and alert on certificates and other security materials to maintain application uptime and minimize SSL management costs.
Organizations can institute strong, comprehensive protections around the sensitive assets that are stored in NAS environments.
IMPORTANT: This offering has a 12-month term commit, billed monthly.
Vormetric Standard Quickstart On-boarding package - $2,000 set-up fee (one-time charge)
Vormetric DSM Server Bundles with Live Data Transformation (LDT) support (monthly recurring subscription for 12-month term commit)
Stand-alone Vormetric DSM Server for High Availability (HA) (monthly recurring subscription for 36 month term commit)
This offering includes the Vormetric Quickstart Standard On-boarding package, which cannot be separated.
As noted above, although this Vormetric DSM Bundle includes the license to support the desired number of Vormetric Encryption Agents, the agents must be deployed separately, either via manual installation or the Vormetric DSM Agent Marketplace tile.
Current Supported Operating Systems are:
Linux Red Hat 6.7, 6.8, 6.9, 7.1, 7.2
Linux CentOS 6.7, 6.8, 6.9, 7.1, 7.2
Linux Ubuntu 14.04, 14.04.01, 14.04.02, 14.04.03, 14.04.04, 14.04.05, 16.04 (All LTS)
Linux SUSE Sles10, SLES11sp3, SLES11sp4, SLES12 sp1, Sles12sp2
Unix is NOT currently supported
Windows Server 2008 Standard
Windows 2012 R2
Vormetric Data Security helps enterprises comply with PCI DSS requirements 3, 7 and 10 that call for the protection of cardholder information. Vormetric Data Security secures cardholder data in databases as well as voice files, reports, and images.
Electronic Patient Health Information (ePHI) needs to have access controls and be secured to maintain compliance with HIPAA/HITECH. Whether unstructured medical imagery or structured database information containing ePHI, Vormetric secures and controls access to ePHI. FDA Title 21 CFR Part 11 — Encryption for stored information relevant to drug manufacturing & distribution.
Vormetric Data Security enables enterprises such as financial services (Chinese Walls) and governments to meet data governance mandates by segregating data repositories so that departments or entities can only see data they own and not adjacent data.
US states have data breach notification laws modeled on California SB 1386 that provides a safe harbor in the event of a breach where the underlying data is encrypted. Vormetric Encryption provides safe harbor and helps businesses avoid the cost and brand damage that comes with breach notification.
Nations around the globe are instituting data protection laws which mandate encrypting citizen personal information including UK Data Protection Act, EU Data Protection Directive and South Korea’s Personal Information Protection Act. Vormetric Data Security secures personal information, be it structured (in databases) or unstructured data.
Vormetric Data Security provides security, key management, access control and reporting so enterprises can demonstrate effective controls over sensitive information.
With over 50, highly varied, national privacy laws in effect worldwide — enterprises, cloud providers and multi-nationals need to ensure that data does not inappropriately cross legal jurisdictions. Vormetric Data Security enables segregation and control of data access to meet their legal obligations – in many cases without changes to applications and infrastructure.
In addition, numerous other compliance regimes mandate protection of data-at-rest that can be enabled with Vormetric. These include FedRAMP/NIST 800-53 requirements for US Federal agencies, FIPS 140-2 for security management environments, the Australia Privacy Act, the EU Data Protection Act, South Korea’s PIPA and Singapore’s MAS TRM.