Search
Close this search box.
Rantronics Logo

Randtronics DPM easyData

Effortless Field-Level Data Protection: no-code or low-code solutions for databases, applications and flat files

DPM easyData provides field-level encryption and other field-level data privacy protections: tokenization, data masking, anonymization
Cover image for Intro to DPM easyData Video
Play Video about Cover image for Intro to DPM easyData Video

Field-Level Data Protection (FLP)

DPM easyData provides FLP services (encryption, format preserved encryption, masking, tokenization, anonymization, pseudonymization) for protecting data stored in databases, applications and flat files.

Data de-identification enables selective redaction by replacing whole or parts of sensitive data with a non-sensitive equivalents. 

DPM easyData complements the  binary authorized ‘can open’ /not authorized ‘can’t open’ protection provided by DPM easyCipher or other TDE products by selectively redacting the content visible to authorized users.

There are many reasons to restrict data visibility to authorized users, including:

  • restricting bank employees to only see last 4 digits of account or credit card
  • preventing DBA or other IT staff accessing personal or financial data – whilst still performing their duties
  • allowing dev/test or analytics teams access to live data to perform their tasks without visibility of sensitive data
  • authorized user is a web application presenting data to the public

 

DPM easyData supports the full range of FLP or data de-identification techniques including masking, tokenization, anonymization, pseudonymization, format preserved encryption and encryption.   

With DPM easyData, organizations centrally manage FLP protection policies, ensuring consistent data protection and compliance with regulatory and privacy standards. CISOs can confidently demonstrate enterprise-wide best-practice privacy management to auditors. 

More information:

DPM easyData comprises a centrally deployed management module that provides FLP services via API, agentless, local deployed agents and utilities:

  • DPM easyData  – central place for administrator to configure data protection policies for applications, flat files and databases.   Requires installation of DPM easyKey for key management services.
  • DPM easyData Database Connector – provides no-code FLP services to MS SQL and Oracle databases. Connector runs on the database to provide tokenization, anonymization, encryption, format preserved encryption or masking of column level data. A connector is required on each database containing data to be protected.
  • DPM easyData Database Clientless – provides no-code FLP services to MS SQL, Maria, Postgres, MySQL and Oracle databases. No agent installation is required on the database to provide tokenization, anonymization, encryption, format preserved encryption or masking of column level data.
  • DPM easyData File – provides a no-code FLP services for protecting the contents of flat files.
  • DPM easyData API – provides low-code FLP services to any application supported by any database.
  • Tokenization by replacing data with tokens of the same size and type (conserving the format)
  • Tokenization in multiple languages for text data
  • Data Masking
  • Integration with DPM Database Manager to tokenize and protect column level data in a database with no application code changes required
  • Full auditing of all console and engine operations
  • Configurable performance monitoring with alerts via syslog and email
  • Industry standard AES-256 encryption with full-lifecycle key management. FIPS 140-3 L3/4 & Common Criteria EAL 4+/5+ certified HSM support
  • Single sign-on, role based and fine-grained access control
  • Ease of Deployment and Use
  • Localization

 

Supported databases for DB Connector:

–  Oracle 19c Std and Ent

–  Microsoft SQL Server 2016 and up

Supported backend databases for DPM easyData:

–  MySQL 8.0

– MS SQL server 2019 and up

– Maria

Supported environments for Database Clientless:

–  Maria

–  Oracle

– MS SQL Server

– MySQL

– Postgres

Supported environments for DPM easyData:

–  Windows 2019 and up

–  RedHat Linux, CentOS, Oracle Linux

–  Physical and virtualized environments

DPM easyData is highly flexibile and can protect and tokenize many different types of data via customizable, user-defined formats. Examples include:

  • Credit card and other payment card numbers
  • Names – surnames, first names, street names, suburbs
  • Bank account numbers, Tax File Numbers,
  • Phone numbers – mobiles and landlines
  • Post codes and ZIP codes
  • Identification numbers – drivers’ licence and passport numbers
  • Dates – birth dates, join dates
  • Currency amounts – salaries, bank account amounts, transaction amounts
  • Social security, national security, and Medicare account numbers

Latest news and articles

Our Customers

Letter from the CEO

Rantronics Logo

Thank you for visiting the Randtronics website.

We make enterprise encryption easy.

Smart businesses already know that only encryption can reduce the attack surface and stop the hackers from stealing their sensitive data. A company that only uses encryption is more secure than a company with all other cyber security measures. Privacy standards such as PCI DSS, HIPAA, and GDPR are all mandating in law the protection of the citizen’s personal data. Fines for breaches are huge. You won’t get fined if your firewall is hacked. You won’t get fined if you suffer a virus or ransomware attack. You WILL get fined if you lose ANY personal data pertaining to ANY citizen. The lowest common denominator is the DATA. Data that is “Encrypted” is out of the scope of the Law.

Whilst all understand the need to protect sensitive data holistically (such as NIST Cyber Security Framework or 12 prescriptive PCI DSS guidelines) their cyber security priorities are misguided to say easy aspects and not addressing “what happens” when these fail? Encryption of data is the only direct protection measure that renders data unreadable compared to upgrading firewalls or virus and malware, IPS, log monitoring, etc. I am saying you need all methods but unless you have implemented enterprise grade encryption you are still unprotected like driving a car without “seatbelts”. “Enterprise grade encryption” as a cyber measure is the “seat belt” that saves lives in car accidents. Industry experts predict a relentless continuation of data breaches this year and penetration testing have proven perimeter defense is easily penetrable.

Randtronics has taken the challenge to make encryption easy and is innovating in many areas. We have already reduced deployment effort to days, use familiar standard components so that less skilled people can deploy and maintain systems.
I welcome discussions via email or phone as through your feedback we will be challenged to continue to innovate to the point where businesses and users do not need to be intimidated when using encryption as the worlds most powerful tool to protect their sensitive data.

Experts predict data breaches will continue at relentless pace, let Randtronics secure your business with “Enterprise grade ubiquitous encryption technology”. Time is of the essence. Why not be pro-active? I invite you to let Randtronics and its global distributors and resellers assess and assist your business directly.

Yours sincerely,
Bob K Adhar, BE, MBA, CISSP
Founder and CEO