0% found this document useful (0 votes)
23 views

CipherTrust Data Security Platform Ds

The document describes the CipherTrust Data Security Platform which provides capabilities for discovering, protecting and controlling access to databases and files across various environments. It offers centralized management, data discovery and classification, secrets management, data protection techniques, and centralized key management to simplify data security and accelerate compliance.

Uploaded by

tomektr
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

CipherTrust Data Security Platform Ds

The document describes the CipherTrust Data Security Platform which provides capabilities for discovering, protecting and controlling access to databases and files across various environments. It offers centralized management, data discovery and classification, secrets management, data protection techniques, and centralized key management to simplify data security and accelerate compliance.

Uploaded by

tomektr
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Data Sheet

CipherTrust Data
Security Platform
Thales offers a unified
approach to data security

cpl.thalesgroup.com
CipherTrust Data Security Platform
You can discover, protect and control your organization’s sensitive • Secrets management
data to avoid the security breaches that are happening with alarming ° Centralized management for all types of secrets
regularity. The CipherTrust Data Security Platform from Thales enables
you to protect your data and meet the data protection compliance ° Built for ease of use in DevOps integrations, automations,
and orchestrations
mandates that are becoming more stringent. To stay a step ahead of
dynamic cybersecurity threats, your organization needs to extend data ° Manage secrets for hybrid, multi-cloud (all clouds), multi-
protection across more environments, systems, applications, processes tenants, on-prem and legacy systems and with human or
and users with a data-centric solution. A data-centric solution secures machine access
data as it moves from networks to applications and the cloud, and • Data protection techniques
decreases the number of resources required to maintain strong data
° Transparent encryption for files, databases and big data
security.
° Application-layer data protection
The CipherTrust Data Security Platform (CDSP) significantly ° Format-preserving encryption
reduces risk across your business. CDSP integrates centralized key
° Tokenization with dynamic data masking
management with data discovery, classification, data protection
and granular access controls. CDSP decreases resources required ° Static data masking
for data security operations and compliance controls by simplifying ° Privileged user access controls
data security, accelerating time to compliance, and securing cloud • Centralized enterprise key management
migration.
° FIPS 140-2 compliant enterprise key management
The CDSP platform offers capabilities for discovering, protecting and ° Unparalleled partner ecosystem of KMIP integrations
controlling access to databases and files—and can secure assets ° Multi-cloud key management
residing in cloud, virtual, and physical environments. This scalable,
° Transparent Data Encryption (TDE) key management
efficient data security platform enables you to address your urgent
requirements and prepares your organization to respond nimbly when
the next security challenge or compliance requirement arises. Environments
• Clouds: Amazon Web Services, Google Cloud Platform, IBM
Cloud, Microsoft Azure, Oracle Cloud Infrastructure, Salesforce,
Capabilities SAP, and more
• Centralized management console • Supported OSs: Linux, Windows and Unix
• Monitoring and reporting • Big Data: Hadoop, SAP HANA
• Data discovery and classification • Database: IBM DB2, Microsoft SQL Server, MongoDB, MySQL,
° Risk analysis with data visualization Oracle, Sybase, Teradata and others
• Data discovery and classification can be combined with • Any storage environment
transparent encryption to automatically encrypt sensitive data at the
file level
Platform advantages
• Ransomware protection
• Discover, protect and control your organization’s sensitive data
° Actively watches for malicious behavior anywhere with next-generation unified data protection
° Behavior monitoring and data analytics enable: • Consistent security and compliance across physical, virtual, and
° Protection against zero-day attacks cloud environments
° Protection when system is disconnected from the internet • Identify and secure data across structured, unstructured and big
° Protection when installed after the existence of ransomware data platforms
on the endpoint
• Reduce time-to-value. Rapidly enable platform capabilities as
needed
• Hardware Security Modules as the secure root of trust for the
platform include FIPS 140-2 Level 3 certification
Key benefits CipherTrust Enterprise Key Management manages encryption keys
for many sources and environments across the enterprise, simplifying
Simplify Data Security. Discover, protect, and control sensitive data encryption key management across storage, databases and clouds.
anywhere with next-generation unified data protection. The CipherTrust The CipherTrust KMIP Server operates on CipherTrust Manager to
Data Security Platform (CDSP) simplifies data security administration centralize key management for many KMIP clients and partner-
with a centralized management console that equips organizations verified solutions. CipherTrust Application Key Management (CAKM)
with powerful tools to discover and classify sensitive data, combat is available for Oracle TDE and Microsoft SQL Server EKM.
external threats, guard against insider abuse, and establish persistent CipherTrust Cloud Key Management (CCKM) streamlines Native key
controls for on-prem and cloud-based data. Organizations can management, Bring Your Own Key” (BYOK) and “Hold Your Own
easily uncover and close privacy gaps, prioritize protection, and Key” (HYOK) for Amazon Web Services (AWS), Google Cloud
make informed decisions about privacy and security mandates before Platform (GCP), Microsoft Azure1, Oracle Cloud Infrastructure (OCI)1,
starting or advancing a digital transformation to fundamentally change Salesforce and SAP1.
how the organization operates and delivers value to customers.
Data-at-Rest Encryption protects data without requiring any changes
Accelerate Time to Compliance. Regulators and auditors to business or data management processes. CipherTrust Transparent
require organizations to have control of regulated and sensitive Encryption (CTE) encrypts data across environments and platforms
data along with the reports to prove it. CDSP supports pervasive (on-premises, cloud, database and big data platforms) with
data security and privacy requirements such as data discovery and comprehensive data access controls that can stop even the most
classification, encryption, access control, audit logs, tokenization, damaging attacks. CTE provides a single pane of glass view and
and key management. Data security controls can be added to new consistent configuration across guardpoints. Extensions such as Live
deployments or in response to evolving compliance requirements. The Data Transformation enable zero-downtime data encryption and key
centralized and extensible nature of the platform enables new controls rotation.
to be added quickly through the addition of licenses and scripted
The CipherTrust Data Security Platform offers a range of products
deployment.
with developer-friendly application programming interfaces for
Secure Cloud Migration. The CipherTrust Data Security Platform Key Management, Encryption and Tokenization. CipherTrust
offers advanced encryption and centralized key management Application Data Protection provides server- or RESTful API-based
solutions that enable organizations to safely store sensitive data in key management and encryption services. CipherTrust Tokenization
the cloud. The platform offers advanced multi-cloud Bring Your Own solutions include both Vaultless Tokenization with Dynamic Data
Encryption (BYOE) solutions to avoid vendor lock-in and ensure Masking and Vaulted Tokenization based on use-case requirements.
the data mobility to efficiently secure data across multiple cloud
CipherTrust Database Protection (CDP) solutions provide database
vendors with centralized cloud-agnostic encryption key management.
column-level encryption without the need for software engineering
Organizations that cannot bring their own encryption can still follow
assistance. CDP solutions deliver the highest level of separation of
industry best practices by managing keys externally using CipherTrust.
duties for access to sensitive data.
Cloud Key Management (CCKM). CCKM supports Bring Your
Own Key (BYOK) and Hold Your Own Key (HYOK) use-cases across
multiple cloud infrastructures and SaaS applications. CCKM provides
a single pane of glass view for each of the public clouds, showing all
regions in a single pane of glass and removing the need for SMEs
DISCOVER
to become experts in every cloud system.With the CipherTrust Data
Security Platform, the strongest safeguards protect an enterprise’s
sensitive data and applications in the cloud, helping the organization ata Sec
plify D
Discovery & Data-at-rest
urit
meet compliance requirements and gain greater control over their Classification Sim y Encryption
data, wherever it is created, used or stored.
FIP
e

Featured products:
ieve Complianc

PROTECT
S 14
MONITOR

0-2 Certifie

CipherTrust Manager (CM) is the central management point for the CipherTrust
CDSP platform, providing data access and key policy management. Manager
Ach

CM is available in both physical and virtual form factors that are up to


d

FIPS 140-2 Level 3 compliant.

Data Discovery and Classification (DDC) enables organizations Clo u


d S e c u rit y
to discover and classify sensitive data from a single pane of glass. Key
Organizations can understand risks, uncover gaps, and make better Developer
Management
APIs
decisions about both third-party data sharing and cloud migration.
CO N TR O L

1 Check with us for dates for HYOK support for this cloud.
CipherTrust Manager
Overview
Key benefits
At the center of the CipherTrust Data Security Platform (CDSP) is
• Centralized key management allows consolidation of
CipherTrust Manager. CipherTrust Manager (CM) centralizes keys,
on-prem and cloud encryption keys across multiple
management and policies for all of the CDSP Connectors:
applications, data stores, and appliances
• Data Discovery and Classification • Provides the foundation for the Ciphertrust Data Security
• Enterprise Key Management Platform, enabling customers to reduce business risk with
data discovery, classification and protection of sensitive data
• Cloud Key Management
• Simplifies management with a self-service licensing portal
• Transparent Encryption and visibility into licenses available and in use
• Live Data Transformation • Cloud-friendly deployment options with support for Alibaba
• Application Data Protection Cloud, AWS, Azure, Google Cloud, OpenStack, Oracle
Cloud, VMware and more
• Database Protection.
• Superior key control and generation via Hardware Security
Built on an extensible microservices architecture, CM enables Module (HSM) integrations
organizations to efficiently address privacy and data protection
• Extensible microservices architecture enabling maintenance
regulatory mandates and adapt readily as encryption and IT
and upgrades without downtime
requirements evolve.
• Unparalleled partner ecosystem of integrations with leading
CM simplifies key lifecycle management including key generation, enterprise storage, server, database, application and cloud
backup and restore, deactivation and deletion. Core features of CM: vendors
role-based access to keys and policies, multi-tenancy
support, robust auditing and reporting of both key usage and
operational changes.

CM is available in both virtual and physical appliance form factors Key features
to address varying deployment use cases from public and private • Full Key Lifecycle Management, including secure key
clouds to on-prem secure deployment with physical security controls. generation, rotation, deactivation, deletion, and backup/
Hardware and virtual appliances can leverage embedded Luna restore
Network HSMs or select cloud HSMs to enable FIPs 140-2 Level 3
• Centralized administration, unifying key management
highest level root of trust.
operations with role-based access control and full audit
Active/Active clustering for the highest availability can be configured log review
with a mix of hardware and virtual appliances. Active/Active • Self-service licensing, streamlining Connector license
clustering provides customers with high-assurance deployments provisioning and ongoing management
ensuring 24x7 uptime to support key management and data
• Secrets management, providing the ability to create and
encryption requirements.
manage secret and opaque objects for use on the platform
• Multi-tenancy provides capabilities required to create
multiple domains with separation of duties to support large
enterprise environments
• REST APIs to automate repetitive management and
encryption tasks
• Flexible HA clustering and intelligent key sharing, offering
clustering physical and/or virtual appliances
• Robust auditing and reporting, including tracking key

CipherTrust Manager
state changes, administrator access, and policy changes
in multiple log formats (RFC-5424, CEF, LEEF) for easy

App
Servers/
Containers
Unified management and administration For CipherTrust Manager Features, Appliance Specifications,
Safety Certifications and Emissions Certifications, please refer to
across the hybrid enterprise the CipherTrust Manager Product Brief.

CipherTrust Manager minimizes total cost of ownership by providing


central management of heterogeneous encryption keys, including keys
generated for CipherTrust Data Security Platform products, Microsoft
SQL TDE, Oracle TDE and KMIP-compliant encryption products.
CipherTrust Manager features an intuitive web-based console and
APIs for managing encryption keys, policies, and auditing across an
enterprise.
CipherTrust Transparent Encryption -
Ransomware Protection
CipherTrust Transparent Encryption - Ransomware Protection (CTE-
RWP) provides active behavior monitoring and data analytics to Key benefits
protect sensitive data from ransomware attacks. CTE-RWP watches
files hosting business-critical data, looking for abnormal I/O activity • Able to detect zero-day attacks (unknown malware)
on a per process basis. It allows administrators to alert or block • Detects ransomware activity – even if installed after the
suspicious activity before ransomware can control your existence of ransomware on the endpoint
endpoints/servers.
• Continuously enforces ransomware protection per disk
volume regardless if the system is connected to the internet
Transparent Data Protection or not

CTE-RWP continuously enforces ransomware protection enabled • Easy-to-deploy protection with minimal configuration, no
per disk volume with minimal configuration and no modification to modification to applications on the endpoint and no setup of
any applications on the endpoint/server. It continuously monitors access controls or encryption policies
abnormal file activity caused by ransomware-infected processes,
and alerts/blocks when abnormal file activity is detected. Key features
• Monitors abnormal I/O activity caused by ransomware-
Easy to Deploy infected processes and alerts/blocks the malicious activity
when detected
CTE-RWP enables administrators to configure ransomware protection
without setting up CTE restrictive access control and encryption • No depencencies on malware signature databases
policies on a per file/folder basis. • Enabled per disk volume; monitors both local and cloud
(SMB/CIFS shares) volumes

Robust Ransomware Detection • A trusted list for permitted processes can be set up to avoid
unwanted monitoring or blocking
CTE-RWP uses process-based machine learning models to
dynamically detect suspicious file I/O activity. It identifies and
alerts or blocks ransomware on endpoints/servers. A trusted list for Technical specifications
permitted processes can be set up to avoid unwanted monitoring • Requires CipherTrust Manager v2.12 and CipherTrust
or blocking. Transparent Encryption v7.4.0 and subsequent versions
• Windows platform (Linux on roadmap)
Managed in CipherTrust Manager • IP addresses, routing configurations, and DNS addresses
CTE-RWP can be licensed separately or in conjunction with CTE. must allow connectivity to CipherTrust Manager
When CTE-RWP is combined with a CTE license, administrators can • Communication between CipherTrust Manager and the CTE
additionally apply fine-grained access control and encryption. Agent defaults to port 443

Authorized User File Server Guard Points

Cyber Criminal

!
CTE-RWP

CipherTrust Manager

CipherTrust Transparent Encryption - Ransomware Protection (CTE-RWP)

(Applicable when licensed with or without CTE)


CipherTrust Secrets Manager
CipherTrust Secrets Management (CSM) powered by Akeyless Vault
is a state-of-the-art enterprise-grade secrets management solution Key benefits
which protects and automates access to secrets including credentials, • Centralized management for all types of secrets
certificates, API keys, and tokens across DevOps tools and cloud
workloads. • Easy-to-use, automated functionality for DevSecOps
• Decreased time to compliance with automation, orchestration
and audit logs
Centralized Secrets Management
• Low total cost of ownership (TCO) – SaaS application with
Manage static and dynamic secrets, specify rotation schedules, no hidden costs for infrastructure, time, resources
manage API keys, SSH keys, and other credentials to eliminate risk of or support
secrets sprawl.
• Log reporting and analytics for auditing and compliance

Easy to Deploy Key features


CipherTrust Secrets Management (CSM) is easily accessible from • Manages all types of secrets
the CipherTrust Manager dashboard. The total cost of ownership is
low because CSM can be configured within minutes without special • Automated processes for creating, storing, sharing, rotating
training so setup happens sooner and faster, and is easy to maintain. and removing secrets
• Dynamic, just-in-time secret generation and management

Seamless Integrations • Access secrets management through CipherTrust Manager


– the unified console to access multiple tools in the data
Built with DevOps in mind, CSM easily integrates with third party security platform to discover, protect and control your data.
applications such as GitHub, Kubernetes, Open Shift and other
applications popular within the DevOps community. • FIPS 140-2 Level 3 Root of Trust with HSMs

Technical specifications
Scalability for hybrid and multi-cloud
• SaaS secrets vault platform with gateway to CipherTrust
Moving to the cloud is often a protracted transition, resulting in hybrid Manager
environments, with some resources on premises, and others distributed
across multiple public and private clouds. CSM works in hybrid, multi- • Supports encryption keys, static secrets, rotated secrets, dynamic
cloud (all clouds), multi-tenant, on-prem and legacy systems and with secrets, SSH cert issuers, PKI cert issuers and certificates
human or machine access. • CipherTrust Manager’s encrypted customer fragment (an
AES256 key) of every secret is protected by the same root of
trust key hierarchy protecting all keys originating from CipherTrust
Manager. This is in addition to the benefits of Akeyless’
Distributed Fragments Cryptography™ (DFC) technology
• Interfaces include: Gateway configuration manager, gateway
console, REST APIs (v1 & v2), CLI
• Integration categories include: Browser Extensions, CI/
CD, Code Management, Configuration Management, Identity
Providers, Infra Automation, Kubernetes, Notification apps and SDKs
CipherTrust Data Discovery
and Classification
Data Discovery and Classification (DDC) locates regulated data, Single pane of glass for clear visibility
both structured and unstructured, across the cloud, big data, and
traditional data stores. A single pane of glass delivers understanding DDC provides a clear understanding of sensitive data, usage, and
of sensitive data and its risks, enabling better decisions about closing risks of exposure, from a single pane of glass. A centralized console
security gaps, prioritizing remediation, and securing your cloud with visualized data and aggregated reports enables informed
transformation. decisions about data sharing, digital transformation, and prioritizing
remediation.
Data Discovery and Classification provides a streamlined workflow
from policy configuration, discovery and classification, to risk
analysis and reporting, helping to eliminate security blind spots and Quick start with flexibility
complexities. Data Discovery and Classification provides a comprehensive set of
built-in classification templates for commonly requested data privacy
and security regulations, such as GDPR and CCPA, while easily
Enterprise-wide data privacy handling custom policies based on specific patterns, algorithms and
CipherTrust DDC delivers an enterprise-wide data privacy solution that more.
is simple to deploy and scale. It provides ready-to-use templates and
a streamlined workflow to help you quickly discover your regulated
data across traditional and modern repositories.

Aw
ar
ion

en
ess
Act

Remediation Policy

Detailed
Reports
Risk Discovery
analysis

Classification

Alert
Demonstrate compliance
CipherTrust Data Discovery and Classification provides detailed
Data Discovery and Classification
reports that can demonstrate compliance with various regulations and Technical specifications
laws. Efficient scans build a strong foundation for overall data privacy
and security to auditors. • Data Stores
• Local storage and local memory on the host

Flexible deployment options • Network storage

DDC is available in both agent-based and agentless deployment ° Windows Share (CIS/SMB)
modes. The choice enables security and IT teams to select deployment ° Unix File System (NFS)
modes for optimal results and efficient cost of ownership. • Databases
° IBM DB2
° Oracle
° SQL
Key benefits • Big Data
• Reduce complexity and risk with streamlined workflows ° Hadoop Clusters
unique to your organization
Type of files supported
• Privacy officers can rapidly uncover privacy gaps, prioritize
• Databases: Access, DBase, SQLite, MSSQL MDF & LDF
remediation, and proactively respond to regulatory and
business challenges from a single pane of glass • Images: BMP, FAX, GIF, JPG, PDF (embedded), PNG, TIF
• Build a strong foundation for overall data privacy and • Compressed: bzip2, Gzip (all types), TAR, Zip (all types)
security through effective scans that help discover both • Microsoft Backup Archive: Microsoft Binary/BKF
structured and unstructured data across a diverse set of data
stores • Microsoft Office: v5, 6, 95, 97, 2000, XP, 2003 onwards

• Ensure secure third-party data sharing by scanning for • Open Source: Star Office/Open Office
sensitive data and removing it, as needed, in advance • Open Standards: PDF, HTML, CSV, TXT

Type of data identified


• Health (Australian Medicare Card, European EHIC, US
Health Insurance Claim number, etc.)
• Financial (American Express, Diners Club, Mastercard, VISA
card numbers, bank account number, etc.)
• Personal (name, last name, address, DOB, email, etc.)
• National ID (social security number, Spanish DNI, etc.)
• Custom information types

Pre-built templates
The solution includes a wide range of ready-to-use templates
that can help you meet common regulatory and business policy
needs:

• CCPA • GDPR
• HIPAA • PCI DSS
• PII • PHI

Minimum RAM required


• 16GB

Minimum Network Connection


• 1GB
CipherTrust Enterprise Key Management
CipherTrust key management products centralize key management for broad range of third-party applications and devices operating in the
CipherTrust Connectors, 3rd party devices, databases, cloud services KMIP client role.
and applications. With CipherTrust’s centralized key management,
organizations increase their control of encryption Database Management
keys and data security, connecting with applications through standard
CipherTrust Application Key Management (CAKM) for databases
interfaces.
can provide high security while providing enhanced IT efficiency.
CAKM is installed in the database to request keys from CipherTrust
Enterprise key management solutions Manager and serve them to Oracle TDE or Microsoft SQL Server
CipherTrust Enterprise Key Management solutions support a variety of EKM interfaces.
applications, including:
Key Management for Proprietary Applications
Key Management Interoperability Protocol (KMIP) For the most convenient integrations with applications that perform
KMIP is an industry-standard protocol for encryption key exchange encryption and require centralized key management, CipherTrust
between clients (appliances and applications) and a server (key Manager offers developer-friendly API’s that can be leveraged in a
store). Standardization facilitates external key management for wide range of application environments. For the most performance-
storage solutions including SAN and NAS storage arrays, self- sensitive applications, CipherTrust Application Data Protection offers
encrypting drives and hyper-converged infrastructure solutions. KMIP application-layer libraries implementing Java, C, C++, .NET and
simplifies the requirement of separating keys from the data being .NET Core with key management “providers” for Microsoft Crypto
encrypted, enabling keys to be managed with a common set of API (CAPI), Crypto Next-Generation (CNG) and Crypto Services
policies. CipherTrust Manager operates in the KMIP Server role for a Provider (CSP) plus PKCS#11.

Key Management Verified KMIP Integrations


Technical specifications HCI

Administration • Cloudian HyperStore, VMware vSAN/VMCrypt, Nutanix, Dell


EMC ECS, NetApp Cloud ONTAP, Hedvig Distributed Storage
• Secure-web, CLI, API Platform, Dell EMC PowerOne, Dell EMC PowerFlex
• Command line scripts
Backup
Key Formats for Search, Alerts, and Reports • Commvault Data Protection Advanced
• Symmetric encryption key algorithms: AES, ARIA
Mainframe
• Asymmetric key algorithms
• Syncsort Assure Encryption for IBM i-Series
° RSA
° Elliptic Curve: brainpool, prime, secp Storage

Third-Party Encryption • DellEMC Data Domain, DellEMC PowerEdge, NetApp FAS,


HPE Proliant/StoreEasy (iLO)*, HPE 3PAR, HPE Primera, IBM
• Microsoft SQL Server EKM, Microsoft SQL Always Encrypted, DS8000 Series
Oracle TDE
Flash Storage
API Support
• Dell EMC PowerMax, IBM , Dell EMC PowerStore
• PKCS#11
• Microsoft Crypto API (CAPI), Cryptographic Service Provider Tape Libraries
(CSP), Cryptographic Next Generation Provider (CNG), • HPE StoreEver, Quantum Scalar series
Java Cryptographic Extension (JCE), Microsoft Extensible Key
Management (EKM) Database/Big Data
• KMIP • MongoDB, IBM DB2, Oracle MySQL

Key Availability and Redundancy


• Secure replication of keys across multiple appliances with
automated backups *integrated via NAE-XML API
CipherTrust Cloud Key Management
CipherTrust Cloud Key Management (CCKM) reduces key
management complexity and operational costs by giving customers Single Pane of Glass
lifecycle control, centralized management and visibility of cloud
encryption keys. Access to each cloud provider from a single console, across
multiple accounts, regions, subscriptions and projects makes
it easier for organizations to understand how their workloads
Customer key control across different clouds are protected. We continually increase
Industry best practices as defined by the Cloud Security Alliance (CSA) key visibility to make it easier for administrators to manage and
require that keys be stored and managed outside of the cloud service control access to the keys in minutes instead of days, and stop
provider and the associated encryption operations1. Cloud Service threats faster.
Providers (CSPs) can comply with best practices by offering Bring Your
Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable
customer control of the keys used to encrypt their data. Customer
control of the keys allows for the separation, creation, ownership and Supported clouds and key management ownership
control, including revocation, of encryption keys or tenant secrets used models:
to create the keys.
Amazon Web Services (AWS) KMS Native BYOK

AWS CloudHSM Native


Key benefits
AWS XKS HYOK
• Gain higher efficiency with centralized key management across
hybrid, single-and multi-cloud environments, including key AWS China Native BYOK
discovery, management of Cloud Native keys and automated
key rotation AWS GovCloud Native BYOK HYOK

• Amplify the benefits of Cloud Native keys by using a robust Google Cloud Platform CMEK Native BYOK
multi-cloud platform with outstanding UI
Google Cloud Platform EKM HYOK
• Leverage the value of “Bring Your Own Key” and “Hold Your
Own Key” services with full lifecycle cloud encryption key Google Cloud Platform EKM UDE HYOK-
lifecycle management CC*

• Comply with the most stringent data protection mandates with Google Workspace CSE HYOK
secure key origination
Microsoft Azure Cloud Native BYOK

Microsoft Azure China Native BYOK


Enhanced IT efficiency
Microsoft Azure GovCloud Native BYOK
Capabilities supporting IT efficiency include
Microsoft Azure Managed HSMs Native BYOK
• Centralized access to each cloud provider from a single browser window
• Management of Cloud Native keys Microsoft Office 365 BYOK

• Automated synchronization ensuring that cloud console operations Oracle Cloud Infrastructure Native BYOK HYOK
are centrally visible
Salesforce.com Native BYOK HYOK
• Automated key rotation with support for expiring keys which can **
save thousands of hours per year
Salesforce Sandbox Native BYOK HYOK
**
Encryption key security SAP Data Custodian Native BYOK
Customer key control requires secure key generation and storage.

CCKM leverages the security of CipherTrust Manager, Luna Network


HSM, or the Vormetric Data Security Manager (DSM) to create keys Flexible Deployment Options
with up to FIPS 140-2 Level 3 security. Deployment environments include: public cloud, private cloud, hybrid
cloud, physical appliances and an as-a cloud-based subscription
Compliance tools you need service.
Key activity logs and prepackaged reports enable fast compliance reporting.
Logs may be directed to multiple syslog servers or SIEM systems.
1 See CSA CCM EKM-04 * HYOK-CC is HYOK for Confidential Computing
** Cache-only Key Service
CipherTrust Transparent Encryption
CipherTrust Transparent Encryption (CTE) delivers data-at-rest
encryption with centralized key management, granular access Key benefits
controls and data access logging that helps organizations meet
compliance reporting and best practice requirements for protecting • Meet compliance and best practice requirements for
data. encryption and access control that scales
• Easy to deploy: no application customization required
The solution’s transparent approach protects structured databases
and unstructured files, across multiple cloud environments, and within • Establish strong safeguards against abuse by privileged
big data implementations. Implementation is seamless – keeping both insiders and malware using stolen credentials
business and operational processes unchanged.
Key features
Meet compliance requirements • Broadest platform support in industry: Windows, Linux and
AIX operating systems
Encryption, access controls and data access logging are basic
requirements or recommended best practices for almost all • High performance encryption: Uses hardware encryption
compliance and data privacy standards and mandates, including PCI capabilities built into host CPUs - Intel, AMD AES-NI and
DSS, HIPAA/Hitech, GDPR and many others. CipherTrust Transparent IBM POWER AES encryption
Encryption delivers the required controls. • Logs permitted, denied and restricted access attempts from
users, applications and processes

Scalable encryption • Role-based access policies control who, what, and how
data can be accessed
CipherTrust Transparent Encryption runs at the file system or volume
level on a server, and is available for Microsoft Windows Server, • Enable privileged users to perform work without access to
many variants of Linux, and IBM AIX operating systems. It can be used clear-text data
in physical, virtual, cloud, and big data environments – regardless of
the underlying storage technology. Administrators perform all policy
and key administration through CipherTrust Manager.

Server-based encryption eliminates bottlenecks with both CipherTrust Transparent


performance and scalability further enhanced by leveraging Encryption Agent
cryptographic acceleration built into CPUs, such as Intel AES-NI and CipherTrust Manager

IBM POWER.

Granular access controls


Granular, least-privileged access policies protect data from external
attacks and privileged user misuse. Policies can be applied by users
and groups from systems, LDAP/Active Directory, and Hadoop. Big Data Containers Cloud Database OS/File Systems

Controls include process, file type and other parameters.


Securing sensitive data-at-rest wherever it resides

Access policies can be defined to create a permitted list of “trusted”


applications to prevent any untrusted binaries (e.g., ransomware) from File-level Privileged user Live Data Integration
encryption access control Transformation to SIEM
accessing data stores protected by CipherTrust Transparent Encryption
and to prevent privileged users from accessing user data in files and CipherTrust Transparent Encryption secures data wherever it resides

databases. These access policies can block any rogue binaries


from encrypting files/databases, even if the intruder has execute
permissions for that binary and read/write permission to the target file
that contains business critical data.

Non-intrusive, transparent deployment


The solution requires no changes to applications, workflows, business
or operational procedures.
Protect data on-premises or in-cloud
Cloud data security might seem easy at first. Turning on the equivalent
CipherTrust Transparent Encryption
of full-disk encryption for a public cloud provider is simple. But it’s a Technical specifications
multi-cloud world. Managing data security across multiple public
clouds and different cloud storage options quickly gets complex. Encryption Algorithms and Capabilities
CipherTrust Transparent Encryption enables you to secure your cloud • AES
data with controls and keys centralized and common across multiple
infrastructure as a service (IaaS) clouds – handling more threats than Extension Licenses
cloud-native can address.
• Live Data Transformation
CipherTrust Transparent Encryption protects nearly any storage
mapped to IaaS environment operating systems. And with advanced Platform Support
data protection for Amazon S3, organizations can apply transparent • Microsoft: Windows Server 2022, 2019 and 2016
encryption and access controls to sensitive data in S3 buckets. The • Linux: Amazon Linux, Red Hat Enterprise Linux (RHEL), SuSE
solution encrypts unstructured files, semi-structured data, or structured Linux Enterprise Server, Ubuntu
databases before they are written to Amazon S3 buckets. The
solution works in conjunction with the FIPS 140-2 up to Level 3 • UNIX: IBM AIX
compliant CipherTrust Manager, assuring strong separation of key and
Database Support
policy management from the data. Once an S3 bucket is guarded
with CTE, any file deposited in it is automatically encrypted, and the • IBM DB2, Microsoft SQL Server, Microsoft Exchange
data inside is rendered useless in the event of unauthorized access. • Data Availability Group (DAG), MySQL, NoSQL, Oracle,
With CipherTrust Transparent Encryption’s support for Amazon S3, SAP, Sybase, Teradata and others
organizations can ensure that volumes of data stored in the cloud are
safe and comply with the strictest security regulations while helping to Application Support
close the cloud industry’s most common security gaps. • Transparent to all applications, including SAP, SharePoint,
custom applications and more
Security Intelligence Big Data Support
CipherTrust Transparent Encryption in concert with CipherTrust
Manager provides insight into file access activities. Data access • Hadoop: Cloudera, IBM
logging includes detail on both authorized data access and • NoSQL: Couchbase, DataStax, MongoDB
unauthorized access attempts wherever CTE is operating. Information • SAP HANA
provided also includes actions of security administrators – another
item required for compliance audit purposes. Encryption Hardware Acceleration
• AMD and Intel AES-NI
• IBM POWER9 cryptographic coprocessor
CipherTrust Transparent Encryption Agent Agent Certification
Allow/Block
• FIPS 140-2 Level 1
Encrypt/Decrypt
Cloud Support
• AWS: EBS, EFS, S3, S3I, S3 Glacier
• AZURE: Disk Storage, Azure Files
• GCP: Persistent Disk, Local SSD, Filestore

Security Intelligence logs are forwarded to SIEM systems via SYSLOG


or CEF among other protocols to speed up threat detection.
Privileged Users Approved Users Cloud Admin
Encrypted & Clear Encrypted & Data sets can also be used to create access pattern baselines which
Controlled Text Controlled
can then be used to rapidly identify threats represented by behavior
*$^!@#)( John Smith *$^!@#)( deviating from baseline.
-|”_}?$% - 401 Main - |”_}?$%-
:>> Street :>>
CipherTrust Transparent Encryption
Extensions and Additions
CipherTrust Live Data Transformation
Data-at-rest encryption deployment and management can present
Key benefits
challenges during initial encryption or when rekeying data that has • Zero-downtime encryption and key rotation
already been encrypted, requiring either planned downtime or data • Efficient online key rotation and data rekeying
cloning and synchronization. Live Data Transformation for CipherTrust
Transparent Encryption (CTE LDT) enables encryption and rekeying • Resource management to balance between encryption and
with unprecedented uptime and administrative efficiency. business demands
• Faster backup and archive recovery
Zero-downtime encryption and key rotation • Centrally managed
Administrators can encrypt data without downtime or disruption to • Enforces policies/compliance
users, applications or workflows. While encryption is underway, users
and processes continue to interact with databases or file systems as • Secures data at rest
usual.

Security best practices and regulatory mandates require periodic key CipherTrust Transparent Encryption
rotation. Live Data Transformation addresses these requirements with
speed and efficiency through online key rotation and data rekeying. for Teradata
CTE LDT provides resource management capabilities to balance CipherTrust Transparent Encryption for Teradata (CTE for Teradata)
between encryption and business demands. An administrator can is a high performance encryption solution for Teradata databases.
define a rule specifying that, during business hours, encryption can A CTE agent on the host allows root users to do their job, without
only consume 10% of system CPU, while on nights and weekends, abusing data by applying block-level encryption, access control and
encryption can consume 70% of CPU. Similar controls are available data audit logging. CipherTrust Manager manages CTE for Teradata
for I/O operations. and prevents unwanted processes from accessing the Teradata
database(s). CipherTrust Manager centralizes encryption key and
CTE LDT offers faster backup and archive recovery. In a data data access policy management.
recovery operation, archived encryption keys recovered from
CipherTrust Manager are automatically applied to an older data set.
Restored data is encrypted with the current cryptographic keys. CipherTrust Transparent Encryption for
UserSpace
CipherTrust Transparent Encryption for CTE UserSpace provides a robust and scalable file system level
encryption and access control solution for the variety of flavors of Linux
SAP HANA servers in the distributed enterprise without changes to infrastructure
CTE safeguards SAP HANA data enabling enterprises to meet or applications. Once CTE UserSpace is deployed, files containing
rigorous security, data governance, and compliance requirements. sensitive data are rendered useless in the event of a breach, misuse
The solution enforces strong data encryption on all SAP HANA data or hijacking of privileged accounts, physical theft of servers, and other
and log partitions and protects and controls access to the SAP HANA potential threats.
Persistence layer. The solution can be quickly deployed and requires
no changes to SAP HANA or the underlying database or hardware
infrastructure. Further, SAP has reviewed and qualified CipherTrust CipherTrust Transparent Encryption for
Transparent Encryption as a suitable solution for SAP HANA 2.0 Kubernetes
environments.
CTE for Kubernetes (CTE K8s) can apply data protection (including
encryption, user and process-based access controls, and data access
logging) on a per-container basis, both to data inside of containers
and to external persistent volume storage accessible from containers.
CipherTrust Tokenization
Tokenization reduces the cost and effort required to comply with
security policies and regulatory mandates such as the European Vaultless Tokenization
Union’s Global Data Protection Regulation (GDPR) and the Payment
Card Industry Data Security Standard (PCI-DSS). CipherTrust Technical specifications
Tokenization offers application-level tokenization services in two
convenient solutions that deliver complete customer flexibility: Vaultless Tokenization capabilities:
Tokenization with Dynamic Data Masking and Vaulted Tokenization. • Format-preserving tokens with irreversible option
Both solutions secure and anonymize sensitive assets—whether they
• Random tokens data length up to 128K
reside in the data center, big data environments or
the cloud. • Date tokenization
• Unicode UTF-8 character set support enable data
Vaultless Tokenization tokenization in almost any language
• Luhn checking option for FPE and random tokens
CipherTrust Vaultless Tokenization protects data at rest while its policy-
based Dynamic Data Masking capability protects data in use. A Dynamic data masking capabilities:
RESTful API in combination with centralized management and services
• Policy based, number of left and/or right characters
enables tokenization implementation with a single line of code per
exposed, with customizable mask character
field. Vaultless Tokenization is provided by dedicated, distributed-
cluster-capable Tokenization Servers, offering full separation of duties. • Authentication with Lightweight Directory Access Protocol
Tokenization management and configuration including an operational • (LDAP) or Active Directory (AD)
dashboard with convenient tokenization configuration workflows
occurs in a graphical user interface. Deployment Form Factors and Options:

Dynamic Data Masking. Policies define whether a tokenized • Open Virtualization Format (.OVA) and International
field is returned fully-or partially-masked based on user identification • Organization for Standardization (.iso)
controlled by an AD or LDAP server. For example, the policies could
• Microsoft Hyper-V VHD
enable customer service representatives to see only the last four digits
of credit card numbers, while account receivables staff could access • Amazon Machine Image (.ami)
the full credit card number. • Microsoft Azure Marketplace
Non-disruptive. Format preserving tokenization protects sensitive • Google Cloud Platform
data without changing the database schema.
System requirements:
• Minimum hardware: 4 CPU cores, 16–32 GB RAM
• Minimum disk: 80GB

Application integration:
• RESTful APIs

Performance:
• More than 1 million credit card size tokenization transactions
per second, per token server (using multiple threads and
batch (or vector) mode) on a 32-core server (dual-socket
Xeon E5-2630v3) with 16 GB RAM

4269-8572-9741-2570

0544 4124 4325 3490

CipherTrust
0544-4124-4325-3490 4269-8572-9741-2570
Tokenization

Sensitive Data Tokenization Stored Protected Data


Vaulted Tokenization
CipherTrust Vaulted Tokenization also offers non-disruptive format
Vaulted Tokenization
preserving tokenization with a wide range of existing formats and the Technical specifications
ability to define custom tokenization formats. Vaulted Tokenization
provides a high level of security for highly sensitive data, and instances Tokenization capabilities:
of it may be installed on a per-server basis or installed as a web • Format-preserving tokens
service supporting multiple clients.
• Random or Sequential token generation
• Purge specific tokens on demand, equivalent to purging
Fast integration original data
CipherTrust Tokenization solutions are rapidly integrated with minimal • Masked: Last four, First six, First two, etc.
software engineering, leveraging standard protocols and environment
bindings. • Fixed length and width masking
• Customer defined custom formats
• Regular expressions (Java style)

Supported Token Vault Databases


• Microsoft SQL Server
• MySQL
• Oracle
• Cassandra

Application integration
• RESTful APIs
• .NET
• Java
CipherTrust Application Data Protection
Overview Operational flexibility is twofold:

CipherTrust Application Data Protection (CADP) offers DevSecOps- First, a broad range of cryptographic providers are available
friendly software tools for key management operations, as well as including native C through Crypto API (CAPI), PKCS#11, the
application-level encryption of sensitive data. The solution is flexible Cryptographic Service Provider (CSP) and Crypto Next Generation
enough to encrypt nearly any type of data passing through an (CNG) Providers for Windows and the Java Crypto Engine (JCE).
application. Protecting data at the application layer can provide the Second, encryption operational flexibility is delivered by the
highest level of security, as it can take place immediately upon data choice to encrypt locally or on CipherTrust Manager, for the library or
creation or first processing, and can remain encrypted regardless of Web Service edition of the product, without changing any code.
its data lifecycle state – during transfer, use, backup or copy. CADP
can be deployed in physical, private or public cloud infrastructure The choice is implemented with a simple configuration change.
to secure data even when it is migrating from one environment to
another, without any modifications to existing encryption or data Where to encrypt involves choices and potential benefits:
processing policies. • Encryption on CipherTrust Manager offers security, performance,
and scalability benefits, and for the highest level of security,
CADP is deployed with CipherTrust Manager, an architecture that
ensures that keys never leave the trusted CipherTrust Manager.
centralizes key and policy management across multiple applications,
Offloading encryption from application servers can enable them to
environments, or sites. The combined solution provides granular access
perform better. Embedded in CADP libraries are load-balancing
controls that separate administrative duties from data and encryption
mechanisms that enable an encryption load to be spread across a
key access. For example, a policy can be applied to ensure that no
cluster of CipherTrust Managers.
single administrator can make a critical configuration change without
additional approval. • Encryption on the application server can provide potentially higher
performance for certain types of encryption workloads. In contrast
CADP features built-in, automated key rotation, and offers a wide to open-source solutions, keys are encrypted in memory when not
range of cryptographic operations including encryption, decryption, in use, and scattered in memory when in use. Both mechanisms
digital signing and verification, secure hash algorithms (SHA), and secure crucial encryption keys from abuse.
hash-based message authentication code (HMAC).
CADP in concert with CipherTrust Manager provides a single interface
CipherTrust Application Data Protection is rich in function and provides for logging, auditing, and reporting access to protected data and
both development and, and operational flexibility: encryption keys.
Functional richness is delivered in the form of built-in server health
checking and failover coupled with multi-tiered load balancing and
Rich Encryption Ecosystem
built-in key rotation. In addition to the key management integrations discussed above,
CipherTrust Application Data Protection has integrations for Microsoft
Development flexibility is delivered with REST, C/C++, .NET Crypto Next Generation (CNG), Microsoft Crypto Service Provider
Core, Net and Java cryptographic libraries to enable creation of (CSP), Microsoft Online Certificate Status Protocol (OCSP), Hashi
crypto applications for the widest range of programming skills. Vault, HortonWorks, Apache HTTP and NGINX Servers, Lieberman
ERPM, and many others.
CipherTrust Manager

CipherTrust Manager

App
Servers/
Sensitive Data
Containers 0544-4124
- 4325-3490 App
Key Mgmt Servers/
Containers
</>
Sensitive Data
0544-4124-4325-3490 REST
</> Applications </>
Java / .NET Web
Encryption CipherTrust Application
Server
acme.com Application Data
Web Server Data Protection

Protection 4269-8572-9741-2570
Encrypted Data

Encrypted
Data 4269-8572-9741-2570
Database
Database
CipherTrust Application Data Protection installed as a Web Service
CipherTrust Application Data Protection with Installable Libraries
Key benefits Application Data Protection
• Centralized key management, freeing developers from Technical specifications
complex and risky key management stores
• Strengthen security and ensure compliance Development Libraries and APIs

• Leverage the cloud with utmost security • Java, C, and C# for .NET Core and .NET

• Accelerate security application development • KMIP standard

• Optimize application server performance • XML open interface W

• Unparalleled partner ecosystem of integrations with leading • Web services: REST


enterprise storage, server, database, application and cloud Crypto Service Providers and Supported
vendors OS’s C provider
• Key management for a broad range of native encryption
• Windows
solutions
• AIX
• Linux
• MacOS

KMIP Server/Provider
• On CipherTrust Manager

PKCS#11 provider
• Windows Server
• AIX
CipherTrust Manager Cluster
• Linux
• Solaris
CipherTrust Manager Cluster

Java Crypto Extension Provider


Encrypted
Data • Windows Server
• HP-UX
CipherTrust
Encrypted Application
Data
Sensitive Data Data Protection • Linux
CipherTrust Application • AIX
Sensitive Data Data Protection • Solaris
App Servers

CSP and CNG Providers


CipherTrust
App ServersManager
• Windows Server 2008 and up
CipherTrust Manager
Encryption Algorithms
• 3DES, AES 256 (CBC and XTS), SHA 256, SHA 384, SHA
CipherTrust Application 512, RSA 1024, RSA 2048, RSA 3072, RSA 4096,
Sensitive Data Data Protection
ECC
CipherTrust Application
Encrypted
Sensitive Data Data Protection
Data • Format-preserving: FF1/FF3, Tokenization

Encrypted Web Application Servers


Data

• Apache Tomcat, IBM WebSphere, JBoss, Microsoft IIS,


Oracle WebLogic, SAP NetWeaver, Sun ONE, and more

Cloud and Virtual Infrastructures


• Works with all major cloud platforms, including AWS, Azure,
IBM Cloud, Google and VMware
CipherTrust Database Protection
Overview
CipherTrust Database Protection (CDP) products provide transparent
Database Protection
column-level encryption of structured, sensitive data in databases Technical specifications
(e.g., credit card, social security numbers, national ID numbers,
passwords, email addresses). CipherTrust Database Protection offers Supported Databases
convenient choices in database protection and leverages CipherTrust • Oracle
Manager for centralized key management. CDP is configured
centrally on the CipherTrust Manager console. • Microsoft SQL Server
• IBM DB2
The CDP solution enables you to efficiently protect and secure
sensitive data fields in databases. CDP solutions are transparent Supported Platforms
and cloud-friendly, requiring no changes to applications or business
• Microsoft Windows
processes. For efficiency, CDP offers a simple configuration change to
choose between encrypting locally, for performance, or remotely in • Linux
CipherTrust Manager, to ensure that encryption keys never leave the • Solaris
secure enclave.
• AIX
CipherTrust Database Protection Encryption Algorithms
CipherTrust Database Protection encrypts data, leveraging database • FPE (FF1, FF3), AES, 3DES, RSA, ECC
views and triggers to ensure that access to nonencrypted and
encrypted fields remains transparent to applications. Key granularity is
on a per-field basis.

Deployment and initial use


CipherTrust Database Protection is installed on each database server.
It can be installed manually or through a silent installer.
CipherTrust Manager
Once installed, CDP is securely linked to CipherTrust Manager for
access to keys, configurations and remote encryption and decryption CipherTrust Manager
services.

Installation is usually followed by a data migration process involving Encrypted


selection of data, defining database schema, view and trigger design, Data
Encrypted
and finally bulk data encryption. Sensitive Data Data CipherTrust
0544-4124-4325-3490
Database
Sensitive Data CipherTrust
Protection
Database Database
CipherTrust Manager 0544-4124-4325-3490
Encrypted dataProtection
Server
Database written to database
Server Encrypted data
written to database
CipherTrust Manager

CipherTrust Manager
Database Server
Sensitive Data
0544-4124-4325-3490
Sensitive Data CipherTrust
CipherTrust 0544-4124-4325-3490 Database
Database Sensitive Data CipherTrust
Protection
acme.com Protection
Web Server 0544-4124-4325-3490
Database Database
Encrypted Protection
data
Server written to database
Database
Encrypted data
Server written to database
Encrypted
Data 4269-8572-9741-2570

Database
Once installed, CDP triggers and views enable

• new data to be encrypted


Technical specifications
• database reads to be decrypted for permitted users Supported Databases
• database updates to be encrypted with full transparency to users • Teradata Database, minimum version 16.2
and workflows
Supported Platforms
Where to encrypt when using CipherTrust Database Protection • SUSE Linux Enterprise Server (SLES) minimum version 11SP3
involves choices and potential benefits:
Encryption Algorithms
• For the highest level of security, encryption on CipherTrust Manager
offers security, performance, and scalability benefits, and ensures • AES, FPE (FF1, FF3)
that keys never leave the trusted CM. Offloading encryption Maximum Column Widths
from database servers can enable them to perform better. And,
embedded in CipherTrust Database Protection are load-balancing • ASCII—16KB, Unicode—8KB
mechanisms that enable an encryption load to be spread across a
Encryption Controls
cluster of CipherTrust Managers.
• Identity-based access per column
• For potentially higher performance for certain fields of database
encryption, you can encrypt on the database server. In contrast to • Dynamic masking based on identity
open-source solutions, keys are encrypted in memory when not
in use, and scattered in memory when in use. Both mechanisms Allow/Deny access controls Encryption Key Sources
protect crucial encryption keys from abuse. • CipherTrust Manager

CipherTrust Teradata Protection


CipherTrust Teradata Protection (CTP) simplifies the process of securing
sensitive columns in the Teradata Vantage SQL Database. To minimize
the potential impact of data protection on associated applications
and workflows, and avoid the increased storage requirements of Key benefits
conventional encryption approaches, CTP offers both traditional • Boost security without compromising the value of big data
encryption and NIST-approved format-preserving encryption (FPE) analytics
capabilities, enabling protection of fields without altering their format.
• Establish protections against cyber attacks and abuse by
Dynamic data masking enables different levels of decryption and
privileged users
presentation of data to specific users.
• Fast, convenient deployment and configuration

Streamline encryption deployment


and usage
The CTP solution reduces potential complexity arising from data
protection for Teradata Vantage SQL as user-defined function (UDF)
in the database engine, enabling data access to be controlled
separately by database users and administrators.

Security administrators specify data access profiles defining


encryption methods and user-specific alllow- and deny-lists. The
solution also enables the use of different encryption keys per database
column, and then binds unique keys to one or more Teradata Vantage
Database users. Specific deny behaviors are also available on a per-
user basis. Once data is encrypted, the data remains protected even
if UDFs are disabled administratively.
CipherTrust Batch Data Transformation
Static Data Masking
To use data sets while preventing misuse of sensitive data, Static Data
Key benefits
Masking transforms selected data into unreadable forms. • Secure, cost-effective static data masking with centralized
data encryption keys from sources hardened up to FIPS 140-
CipherTrust Batch Data Transformation (BDT) offers high-performance 2 Level 3
data masking with centralized encryption key management,
• Enable database sharing with reduced risk
leveraging CipherTrust Application Data Protection (CADP) and
CipherTrust Vaultless Tokenization (CT-VL) to protect vast quantities of • Accelerates protection of existing data following deployment
data quickly. of CipherTrust Data Discovery and Classification
• Static data masking where you need it. Deploy on premises,
Static Data Masking has many use cases, such as:
in the cloud, or as a hybrid deployment.
1. Prior to sharing data with third parties.
2. In databases shared with development, QA, R&D or analytics. Technical specifications
3. Before adding a data set to a big data environment. Data Transformation Options:
4. In advance of extract, transform and load (ETL) operations. • Tokenization, Data Encryption
Other use cases include • Formatting, preserving alpha/numeric
• Preparing a database for a tokenization or encryption deployment Policy File Options:
• Rekeying an encrypted column of data after key rotation • Specific action for each individual column transformation
–Encrypt, decrypt, tokenize, de-tokenize and re-key
• Easy to apply encryption without the need for application
changes
• Flexible key management options – keys in CipherTrust
Manager or server, multiple key support

Data Security Platform Requirements


• Key sources: CipherTrust Manager, Vormetric Data Security
Manager, KeySecure Classic
• Pre-requisite components: Tokenization requires CipherTrust
Tokenization Server deployment and license; Encryption
Protect Data Before Sharing Prepare Existing Databases requires either CipherTrust Application Data Protection or
Vormetric Application Encryption and license

Hardware and Operating System Requirements:


with Third with Dev, with
Extract,
Transform, For For • Processor with 4 cores, 16GB RAM (minimum)
Parties QA Analytics and Load Tokenization Encryption

• Java Runtime Environment (JRE)


CipherTrust Batch Data Transformation for High-Volume Flexible Data Masking, Tokenization and Encryption
• Windows Server 2012 minimum
• Linux – RedHat, CentOS, Ubuntu and SUSE
CipherTrust Intelligent Protection
CipherTrust Intelligent Protection
CipherTrust Intelligent Protection (CIP) is an all-in-one solution
Key benefits
designed to simplify and strengthen your organization’s data security. • Locate both structured and unstructured sensitive data across
CIP discovers and classifies data based on sensitivity, vulnerability, the entire enterprise in multi-cloud, big data, relational
and other risk profiles and proactively protects at-risk data using databases, or file storage systems
encryption and access controls. CIP is a solution configuration within • Classify sensitive data—such as national IDs, financial data,
the Thales CipherTrust Data Security Platform that leverages CipherTrust and personal data—based on built-in templates or market-
Manager, CipherTrust Data Discovery and Classification, and proven classification techniques
CipherTrust Transparent Encryption.
• Leverage rich visualizations and risk scores to help you
decide what additional protection is needed for data
Accelerate time to compliance identified and classified as being at risk
Secure your organization’s sensitive data and comply with ubiquitous • Proactively remediate risk using automated workflows and
data security and privacy requirements under GDPR, CCPA, PCI-DSS, data protection techniques, such as encryption and access
HIPAA, and other evolving regulatory and industry mandates. controls

Build operational efficiency with Key features


• Rapid discovery and classification of both structured and
integrated workflows unstructured sensitive data across the entire enterprise in
Simplify data security operations and strengthen data protection with multi-cloud, big data, relational databases, or file storage
automated compliance workflows that enable you to discover, classify systems
and encrypt in a single step when new sensitive data is found. • Built-in classification profile templates and infotypes are
constantly kept up to date to reflect the latest mandates
Uncover and close security gaps • Configurable policies protect at-risk data using encryption
and granular access controls
Uncover security gaps and apply the most appropriate data
protection techniques to proactively protect data based on • Detailed charts and reports provide risk analysis, status, and
vulnerability and risk profiles. alerts throughout the data lifecycle
• Highly scalable solution designed to keep pace with data
growth

110101001010010100101010
01010101010101010
0101010010101010
11100010100010001
1010100100010001010

CipherTrust
Data Discovery and
Classification

CipherTrust Manager

CipherTrust
Intelligent
Protection
© Thales - October 2023•GHv21

CipherTrust
Transparent Encryption

cpl.thalesgroup.com
Contact us – For all office locations and contact information, please visit cpl.thalesgroup.com/contact-us

You might also like