The Vormetric Transparent Encryption (VTE) agent runs on each node of Pivotal Greenplum. Security Administrators define directories that contain sensitive database and log files and set “guard points” on those directories. Any time the VTE agent intercepts I/O on a guardpoint, the access is evaluated and the end user is presented either with clear text data, shown ciphertext only, or prevented from opening the file all together, depending on a predefined ACL policy.
Thales Vormetric Transparent Encryption (VTE) integrates with Pivotal Greenplum to establish strong controls around sensitive data. Thales VTE delivers data-at-rest encryption with centralized key management, privileged user access control, and security intelligence, all designed to proactively meet compliance reporting requirements for structured databases and unstructured files.
Persistent security policy enforcement
Protects against unauthorized access by users and processes and monitors both authorized and unauthorized user activity.
Granular controls and least-privileged access policies
Protects data from advanced persistent threats (APTs) and misuse by privileged users and administrators.
Security intelligence through event logging
Helps satisfy compliance and forensic reporting and enables additional data security analytics with popular Security Information and Event Management (SIEM) systems.
Thales e-Security is a leader in advanced data security solutions and services delivering trust wherever information is created, shared, or stored. Security solutions ensure that critical data is both protected and trusted in any deployment – on-premises, in the cloud, in data centers, or in big data environments – without sacrificing business agility. Security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales e-Security is part of Thales Group.
Strong, standards-based encryption protocols, such as AES and ECC
Completely transparent to the end user
Integrated automation tools to simplify deployment and scalability
Low overhead encrypt/decrypt maintains high query performance
Detailed data event logs satisfy compliance and forensic reporting requirements
Supports integration with SIEM tools for stronger log monitoring and alerting
Role-based, granular access control policies that enforce access by user/group, time/day, data type, and executable
Thank you for your interest!
We will get back to you shortly.