Advanced Data-at-rest Encryption and Access Control

Encrypts, controls access to data and provides data access audit logging without impacting applications, databases or infrastructure - wherever servers are deployed

Cyber Security Excellence Awards

Vormetric Transparent Encryption

The Vormetric Transparent Encryption solution protects data with file and volume level data-at-rest encryption, access controls, and data access audit logging without re-engineering applications, databases or infrastructure. Transparent file encryption deployment is simple, scalable and fast, with agents installed above the file system on servers or virtual machines to enforce data security and compliance policies. Access policies and encryption key are managed by the Vormetric Data Security Manager, and can span local data centers, cloud environments and hybrid deployments.

Vormetric Transparent Encryption

Our transparent data encryption software allows you to implement data-at-rest encryption and access controls without changes to applications and business processes—significantly reducing the cost of encryption deployment and operation.


Scaling to deployments of 10's of thousands of servers, the Vormetric Transparent Encryption solution is available for Windows, Linux, and Unix platforms. The enterprise encryption software can be used across physical, cloud, container and big data environments.

Meet Compliance and Best Practice Requirements

Encryption, access controls and data access logging are basic requirements or recommended best practices for almost all compliance and data privacy standards and mandates, including PCI DSS, HIPAA/Hitech, GDPR and many others.

Granular Access Controls

Role-based access policies control who, what, where, when and how data can be accessed. Access controls are available for system level users and groups as well as LDAP, Active Directory, Hadoop and Container users and groups. Available controls enable root and other privileged users to perform their work without access to clear-text data that might result in a compliance violation or theft.

High-Performance Encryption

Vormetric Transparent Encryption features enhanced encryption performance using the AES hardware encryption algorithms built into system CPUs. In addition, file-system optimization techniques such as multi-threading, look ahead caching, and pipelining further enhance performance. The result is encryption without impact to SLAs or the requirement for additional compute resources. A distributed agent-based deployment model eliminates the bottlenecks and latency that plague legacy proxy-based encryption solutions.

Broad Operating System and Environment Support

Secure structured databases and unstructured files across data centers, cloud and big data environments on Linux, Windows and Unix with a single infrastructure and management environment. Encryption, access control and data access audit logging are available without changes to infrastructure, applications or workflow for maximum control with minimal costs and resource requirements.

Platform support:

Microsoft—Windows Server 2008, 2012, 2016 and Windows 2016 Server Core; Linux—Red Hat Enterprise Linux (RHEL), SuSE Linux Enterprise Server, AWS Linux and Ubuntu; UNIX—IBM AIX.

Database support:

IBM DB2, MySQL, NoSQL, Oracle, SQL Server, Sybase, and others

Application support:

Transparent to all applications, including Microsoft, Documentum, SAP, SharePoint, custom applications, and more

Big data support:

Hadoop—Cloudera, Hortonworks, IBM; NoSQL—Couchbase, DataStax, MongoDB; SAP HANA; Teradata

Encryption hardware acceleration:

AMD and Intel AES-NI, IBM P8 cryptographic coprocessor, SPARC encryption

Agent certification:

FIPS 140-2 Level 1

Container support:

Docker, OpenShift

Cloud Storage support:

AWS: EBS, EFS, S3, S3I, S3 Glacier
AZURE: Disk Storage, Azure Files

Video : Demo: Vormetric Transparent Encryption

Find out just how secure your data can be without impacting business operations. This demo will show you how to secure your most crucial asset, while maintaining the same user experience your stakeholders have learned to expect.


Solution Brief : Vormetric Transparent Encryption

Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure.


Data Sheet : Vormetric Data Security Platform

Find the next level of detail about Vormetric Transparent Encryption and the underlying platform that supports it here. The Vormetric Data Security Platform makes it efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, Vormetric Data Security Platform products can be deployed individually, while sharing efficient, centralized key management.


Solution Brief : Safeguarding Data with Privileged User Access Controls

Since the introduction of multi-user computer systems over 40 years ago, there has been a fundamental flaw in their security architecture. The flaw? – The concept of a Root User, Domain Administrator, System Administrator, Cloud administrator or other high level computer operator – and their data access rights. To learn more about how Thales products on the Vormetric Data Security Platform can help to solve the problem download the report.


Customer Story : Becton Dickinson

Read about how Beckton Dickinson, a global medical technology company, uses Vormetric Transparent Encryption and the Vormetric Data Security Platform to safeguard their data.


White Paper : Vormetric Transparent Encryption Architecture

Today’s IT and security organizations need to continue to scale their capabilities. They need to employ safeguards around larger volumes of sensitive data. They have to guard against more persistent and sophisticated threats, and they must establish these safeguards in more places. To address these expanding requirements, leading enterprises and government agencies rely on Vormetric Transparent Encryption.

Visionner notre démo interactive Explorer
Programmer une démo en direct Programmer
Entrer en contact avec un spécialiste Nous contacter