Rantronics Logo

Randtronics DPM easyCipher

No-code TDE protecting databases, files stores and laptops

Diagram of easyCipher manager controlling transparent data encryption (TDE) on databases, servers and laptops
DPM easyCipher TDE protection for databases, servers & laptops
Image for intro to easyCipher video
Play Video about Image for intro to easyCipher video

Transparent Data Encryption

Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders and databases.    Protection is ‘transparent’ as contents are automatically decrypted for authorised users.    Like a lock-box,  TDE protected objects are either locked or unlocked.

DPM easyCipher is centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed.

DPM easyCipher protects all files and folders on servers or laptops.   Server environments protected by DPM easyCipher include database servers, web/app servers and file servers.

When installed on database servers,  DPM easyCipher can either extend or replace database-native TDE (i.e. TDE solutions provided by database vendors to secure their own DB products): 

  • Customers already using database-native TDE protection, use easyCipher to protect information residing outside of the database;
  • Customers with databases that lack database-native TDE protection simply use easyCipher to protect all files including multi-vendor databases.   

TDE, protecting structured data and more...

DPM easyCipher makes it quick and easy to implement encryption right across your organization:

  • TDE protection for entire server contents;
  • like database-native TDE, easyCipher protects structured data within databases from unauthorized access;
  • unlike database-native TDE,
    • protection also covers DB log files, copies of SQL queries and other materials that may contain echos and traces of the sensitive data contained within the database,
    • copies of sensitive data residing on web/app servers, file servers or laptops are also protected wherever DPM easyCipher agents are deployed,
    • responsibility for encryption management is centralized and out of the hands of DBA teams; 
  • DPM easyCipher generates and manages encryption keys for all DPM easyCipher agents under its control;   
  • DPM easyCipher protects the whole database environment providing additional protection in the event of a compromised DBA or System Admin account.
Randtronics DPM ensures that only users with specific permissions can access sensitive data. Eliminate risk of data breach by a compromised privilege user acount
Randtronics DPM provides fine-grained data protection. Only users specifically granted access are able to see sensitive data

TDE and beyond...

For customers with basic TDE encryption requirements,  DPM easyCipher is available as standalone solution.

Customers also have the flexibility of combining DPM easyCipher with other components from the Randtronics DPM product suite to address more complex requirements:

DPM Product Suite

Diagram of Randtronics DPM Product Suite illustrating solutions available for protection all major enterprise data stores
Randtronics DPM Product Suite

Enterprise Key Management – deploying DPM easyCipher with DPM easyKey enables organizations to:

  • completely isolate encryption key administration from other roles;
  • centrally manage keys derived from clusters of multi-vendor HSM;
  • comply with key use and storage data-sovereignty obligations.

Field-Level Data Protection (FLP) – deploying DPM easyCipher, DPM easyKey and DPM easyData enables organizations to:

  • implement fine-grained and sophisticated data-privacy control over database contents – in contrast to the lock-box protection provided by TDE, FLP enables organizations to protect data from authorized users;
  • define and control policies to determine how sensitive data-types are presented to different applications and users;
  • implement the full range of field-level protections including column-level encryption, tokenization, masking, anoymization over any database or flat-file.

Latest news and articles

Goodbye, Tina Turner

Sad news this week that the Queen of Rock ‘n’ Roll has exited the stage. Many of us at the Randtronics team grew up hearing

Read More

Our Customers

Letter from the CEO

Rantronics Logo

Thank you for visiting the Randtronics website.

We make enterprise encryption easy.

Smart businesses already know that only encryption can reduce the attack surface and stop the hackers from stealing their sensitive data. A company that only uses encryption is more secure than a company with all other cyber security measures. Privacy standards such as PCI DSS, HIPAA, and GDPR are all mandating in law the protection of the citizen’s personal data. Fines for breaches are huge. You won’t get fined if your firewall is hacked. You won’t get fined if you suffer a virus or ransomware attack. You WILL get fined if you lose ANY personal data pertaining to ANY citizen. The lowest common denominator is the DATA. Data that is “Encrypted” is out of the scope of the Law.

Whilst all understand the need to protect sensitive data holistically (such as NIST Cyber Security Framework or 12 prescriptive PCI DSS guidelines) their cyber security priorities are misguided to say easy aspects and not addressing “what happens” when these fail? Encryption of data is the only direct protection measure that renders data unreadable compared to upgrading firewalls or virus and malware, IPS, log monitoring, etc. I am saying you need all methods but unless you have implemented enterprise grade encryption you are still unprotected like driving a car without “seatbelts”. “Enterprise grade encryption” as a cyber measure is the “seat belt” that saves lives in car accidents. Industry experts predict a relentless continuation of data breaches this year and penetration testing have proven perimeter defense is easily penetrable.

Randtronics has taken the challenge to make encryption easy and is innovating in many areas. We have already reduced deployment effort to days, use familiar standard components so that less skilled people can deploy and maintain systems.
I welcome discussions via email or phone as through your feedback we will be challenged to continue to innovate to the point where businesses and users do not need to be intimidated when using encryption as the worlds most powerful tool to protect their sensitive data.

Experts predict data breaches will continue at relentless pace, let Randtronics secure your business with “Enterprise grade ubiquitous encryption technology”. Time is of the essence. Why not be pro-active? I invite you to let Randtronics and its global distributors and resellers assess and assist your business directly.

Yours sincerely,
Bob K Adhar, BE, MBA, CISSP
Founder and CEO