Pivotal + VMware: Transforming how more of the world builds software

Secure Sensitive Data from Breaches and Unprivileged Access

Thales Vormetric Transparent Encryption (VTE) integrates with Pivotal Greenplum to establish strong controls around sensitive data. Thales VTE delivers data-at-rest encryption with centralized key management, privileged user access control, and security intelligence, all designed to proactively meet compliance reporting requirements for structured databases and unstructured files.

Persistent security policy enforcement

Protects against unauthorized access by users and processes and monitors both authorized and unauthorized user activity.

Granular controls and least-privileged access policies

Protects data from advanced persistent threats (APTs) and misuse by privileged users and administrators.

Security intelligence through event logging

Helps satisfy compliance and forensic reporting and enables additional data security analytics with popular Security Information and Event Management (SIEM) systems.

Watch
Greenplum Bits: Encryption Overview + Vormetric

Thales Overview

Thales e-Security is a leader in advanced data security solutions and services delivering trust wherever information is created, shared, or stored. Security solutions ensure that critical data is both protected and trusted in any deployment – on-premises, in the cloud, in data centers, or in big data environments – without sacrificing business agility. Security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales e-Security is part of Thales Group.

Learn more




Integration features

Strong, standards-based encryption protocols, such as AES and ECC

Completely transparent to the end user

Integrated automation tools to simplify deployment and scalability

Low overhead encrypt/decrypt maintains high query performance

Detailed data event logs satisfy compliance and forensic reporting requirements

Supports integration with SIEM tools for stronger log monitoring and alerting

Role-based, granular access control policies that enforce access by user/group, time/day, data type, and executable


How it works

The Vormetric Transparent Encryption (VTE) agent runs on each node of Pivotal Greenplum. Security Administrators define directories that contain sensitive database and log files and set “guard points” on those directories. Any time the VTE agent intercepts I/O on a guardpoint, the access is evaluated and the end user is presented either with clear text data, shown ciphertext only, or prevented from opening the file all together, depending on a predefined ACL policy.





Get Started

Let's talk.

Contact us about Thales.

Thank you for your interest!

We will get back to you shortly.

Contact us