
Products overview
Randtronics Data Privacy Manager
Randtronics DPM makes it easy to secure (encrypt, mask, manage key) your data everywhere, without slowing down your business
Randtronics Data Privacy Manager (DPM) is a 100% software-only data security platform that manages encryption and masking based protection of structured and unstructured data on-premise and on-cloud.
The products in the DPM suite between them provide:
- Universal, centralized key management with assurance to FIPs 140-3 Level 3/4 and Common Criteria EAL 4+/5+
- Encryption, format preserved encryption, tokenization and masking
- No-code change Transparent Data Encryption (TDE) for Windows and Linux environments
- No-code change field-level protection (FLP) for MS-SQL Server, MySQL, Maria, Postgres, Oracle Database and flat files
- Low-code API protection for any field-level protection (FLP) for any application-database stored anywhere
- Data sovereignty assurance: total control of where data and keys are stored and used
- Geopolitical flexibility – use HSMs from Germany, France, USA, Switzerland or BYO crypto
- Shared file encryption to protect files shared across Dropbox, email, OneDrive, Google Drive, FTP
Encryption is your last line of defence against data breach, and getting it right should be your first priority
Protecting Structured and Unstructured data on-premise and on-cloud

Future-proofing and flexibility
Randtronics DPM offers you future-proofing and flexibility to design and evolve a data privacy solution to meet your changing business requirements.
DPM components work together to provide a comprehensive centrally managed enterprise encryption platform or customers can opt to mix and match to meet their specific requirements:
- Standalone no-code TDE with automated key management
- Standalone enterprise key management
- No-code TDE with key management
- FLP with key management
- Point & Click protection for file sharing via insecure medium & media (with or without centralized key management)
- All of the above: no-code TDE, FLP and centralized key management
Most organizations are on a journey to improve and evolve their data protection methods and are looking for solutions that can both address immediate requirements plus provide a pathway to more comprehensive coverage.
With this flexibility in mind, we have designed the DPM product suite to allow customers to mix and match components to address a wide range of encryption-based requirements.
We offer Transparent Data Encryption (TDE) with or without Enterprise Key Management.
For customers with an existing TDE solution from their DB vendor (native TDE), Randtronics offers the ability to extend encryption protection to include the extended database environment plus the ability to air-gap sensitive data from the IT Organization.
For customers seeking to implement fine-grained Field Level Data Protection (FLP) masking, pseudonymization, tokenization or anonymization we offer a range of no-code and low-code solutions that between them allow advanced field-level data de-identification protection for any application storing data in database or flat-file.
Lastly, we as are consistently hearing customers asking for simple but secure means of sharing sensitive data over insecure medium or media we also offer a utility to address Transit Protection.

Randtronics DPM Protects Keys and Data: at-Rest, in-Use and in-Transit

Terms:
TDE – Transparent Data Encryption
FLP – Field Level Data Protection
API – Application Programming Interface
Native TDE – Non-Randtronics TDE solution from DB vendor
N/A – Not applicable i.e. Policy-based data protection not possible with Native TDE
DPM Enterprise Encryption Management Products

Learn more our products:
Secure your data everywhere, without slowing down your business
Download More Information
Latest news and articles

Transforming Data Security: Three Breakthrough Developments Reshaping Protection Standards
The Evolving Frontier of Digital Protection The digital security landscape is changing at breathtaking speed. Each day, cyber threats grow more sophisticated, while data breaches

Why Traditional Defenses Are No Longer Enough to Protect Your Data
Data breaches are no longer a question of “if,” but “when.” As cyberattacks grow more sophisticated, organizations relying on traditional perimeter defenses find themselves vulnerable

Data Breaches Start with Unencrypted Data: Here’s How to Stop Them
As organizations grow more reliant on data-driven operations, protecting sensitive information must become a top priority. Unfortunately, many companies still store data without encryption, creating
Our Customers







