Randtronics DPM easyCipher
No-code TDE protecting databases, files stores and laptops
Transparent Data Encryption
Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders and databases. Protection is ‘transparent’ as contents are automatically decrypted for authorized users. Like a lock-box, TDE protected objects are either locked or unlocked.
DPM easyCipher is centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed.
DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers and file servers.
When installed on database servers, DPM easyCipher can either extend or replace database-native TDE (i.e. TDE solutions provided by database vendors to secure their own DB products):
- Customers already using database-native TDE protection, use easyCipher to protect information residing outside of the database;
- Customers with databases that lack database-native TDE protection simply use easyCipher to protect all files including multi-vendor databases.
TDE, protecting structured data and more...
DPM easyCipher makes it quick and easy to implement encryption right across your organization:
- TDE protection for entire server contents. All database types, editions and versions of MS SQL Server, Oracle, MySQL, Postgres, Maria, etc. supported;
- Like database-native TDE, easyCipher protects structured data within databases from unauthorized access;
- Unlike database-native TDE,
- protection also covers DB log files, copies of SQL queries and other materials that may contain echos and traces of the sensitive data contained within the database,
- copies of sensitive data residing on web/app servers, file servers or laptops are also protected wherever DPM easyCipher agents are deployed,
- responsibility for encryption management is centralized and out of the hands of DBA teams;
- DPM easyCipher generates and manages encryption keys for all DPM easyCipher agents under its control;
- DPM easyCipher protects the whole database environment providing additional protection in the event of a compromised DBA or System Admin account.
TDE and beyond...
For customers with basic TDE encryption requirements, DPM easyCipher is available as standalone solution.
Customers also have the flexibility of combining DPM easyCipher with other components from the Randtronics DPM product suite to address more complex requirements in area of masking, de-identification, key management, assurance to FIPs 140-3 Level 3/4 & EAL 4+/5+:
DPM Product Suite
Enterprise Key Management – deploying DPM easyCipher with DPM easyKey enables organizations to:
- completely isolate encryption key administration from other roles;
- centrally manage keys derived from clusters of multi-vendor HSM (Germany, France, USA, Switzerland, BYO Crypto);
- comply with key use and storage data-sovereignty obligations.
Field-Level Data Protection (FLP) – deploying DPM easyCipher, DPM easyKey and DPM easyData enables organizations to:
- implement fine-grained and sophisticated data-privacy control over database contents – in contrast to the lock-box protection provided by TDE, FLP enables organizations to protect data from authorized users;
- define and control policies to determine how sensitive data-types are presented to different applications and users;
- implement the full range of field-level protections including column-level encryption, tokenization, masking, anoymization over any database or flat-file.
Latest news and articles
Why Traditional Defenses Are No Longer Enough to Protect Your Data
Many businesses continue to rely heavily on traditional security measures like firewalls, antivirus programs, physical security, auditing, and access controls to safeguard their data. While
The Importance of Encryption in Today’s Cybersecurity Landscape
Cyber threats are constantly evolving, and traditional defenses like firewalls and antivirus software are no longer enough to fully protect your business. While these tools
Wide-ranging attacks against Barracuda appliances linked to China
This week the news broke that Mandiant (an incident response firm) attributed the recent cyberattack campaign targeting customers utilizing Barracuda’s Email Security Gateway to hackers