Vormetric - Teradata Solution Brief
Mehr details
Unabhängiger Softwareanbieter
The people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced with an increasing number of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting compliance mandates, you can rely on Thales to secure
your digital transformation.
Thales provides critical data security capabilities for Teradata including integrated encryption, key management, and auditing. Customers can extend our proven Vormetric platform for protecting structured and unstructured data to their Teradata deployments. These capabilities complement Teradata environments to provide the most secure, robust, flexible, and comprehensive data security solution available.
CipherTrustProtection for Teradata Database simplifies the process of employing column-level encryption in your Teradata database. The product reduces complexity for developers by offering documented, standards-based application programming interfaces (APIs) and user-defined functions (UDFs) that can be used to perform cryptographic and key management operations.
Version | Teradata Versions |
---|---|
6.1.3 | Vantage AdvSQL 16.20 TD 16.10 TD 15.10 |
6.0.2 | TD 16.20 TD 16.10 TD 15.10 |
5.2.4 | TD 16.20 TD 16.10 TD 15.10 |
CipherTrust Transparent Encryption for Teradata Database simplifies the process of securing sensitive records, with block-level database encryption backed by centralized key management, privileged user access controls and detailed data access audit logging.
Version | Teradata Versions |
---|---|
7.0.0.103 | Vantage AdvSQL 17.00 Vantage AdvSQL 16.20 |
6.1.3 | Vantage AdvSQL 16.20 |
The CipherTrust Data Security Platform from Thales removes complexity from data security, accelerates time to compliance, and secures cloud migrations. The platform is designed for the cloud, unifying data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in fewer resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced business risk.