
Advanced Persistent Threat (APT) reduction
Don't make easy for hackers to learn from your log files
Advanced Persistent Threat (APT) attackers invest time and effort to learn your vulnerabilities - log files are too valuable to leave unprotected
APT and Log File Protection
Log files help APT attackers learn about your organization, your vulnerabilities and how best to evade your security measures.
Harden your defences against APT attacks by encrypting log files using Randtronics DPM easyCipher Transparent Data Encryption (TDE):
- easy to implement: no-code changes, fast install, minimal performance overhead
- standardized protection: centrally managed, policy-based protection Transparent Data Encryption (TDE) with centralized key management for protecting databases, servers at the file/folder level
- ‘air gap’ protection: security that can not be side-stepped by system admin or other privileged accounts
Why Now?
Advanced Persistent Threat attacks require sophisticated skills and the time and patience to spend extended periods of time gathering information from multiple targets.
This style of attack requires dedicated and resources but can yield substantial results both in terms of financial gain but also in terms of disruption.
For nation states that choose not to follow international norms, APT is an attractive form of asymmetric warfare that is easy to deny, and can deliver spectacular financial and disruption results for relatively small investment. With little downside and a strong payoff it is likely that APT attacks will to continue to mount.
Why Wait?
With Randtronics DPM enterprise encryption, it has never been easier to rollout and manage TDE encryption for all your databases, servers and laptops.
We envision a future where organizations standardize TDE protection all systems – no more second guessing as to whether the data might be useful to an attacker – no more gaps for APT attackers to exploit vulnerabilities.
Start today by adding log file protection to your current encryption initiatives for databases and servers:
i) Replace native database TDE with a security system that can protect everything on the DB server
ii) Protect secrets on web servers
iii) Protect content on file servers – including from system admin and other privileged users

As a result of stricter audit and compliance requirements, it is increasing common for organisations to preserve many years of log files from networks, servers, firewalls, access control systems, applications and other systems.
To a diligent hacker who has managed to gain a toehold inside the firewall, log files contain troves of information that when pieced together can point to system vulnerabilities and/or provide background and context for customised and plausible social hacks.
Why TDE?
There are many types of encryption that address different types of risk.
Volume or disk encryption provides only physical protection, that is, securing data when the system is powered off or the disk is stolen. Once the system is running, data becomes accessible and vulnerable to online attacks, leaving sensitive information in logs, reports, and other applications exposed.
In contrast, Randtronics DPM TDE encryption protects data continuously, even in active online systems, ensuring that logs, reports, and operations remain secure and unreadable to unauthorized users and applications. Moreover Randtronics TDE provides protection against data theft even by attackers that have gained access to system administrator privileges.
Randtronics DPM easyCipher
DPM easyCipher provides transparent data encryption for databases, web/app servers, file servers, NAS storage and end-devices.
Data policies and encryption keys are managed centrally providing enterprise-wide control of sensitive data.
DPM agent installed on end-point-device mediates all access to secured folders and prevents access from any non-whitelisted user or application.

Latest news and articles

Transforming Data Security: Three Breakthrough Developments Reshaping Protection Standards
The Evolving Frontier of Digital Protection The digital security landscape is changing at breathtaking speed. Each day, cyber threats grow more sophisticated, while data breaches

Why Traditional Defenses Are No Longer Enough to Protect Your Data
Data breaches are no longer a question of “if,” but “when.” As cyberattacks grow more sophisticated, organizations relying on traditional perimeter defenses find themselves vulnerable

Data Breaches Start with Unencrypted Data: Here’s How to Stop Them
As organizations grow more reliant on data-driven operations, protecting sensitive information must become a top priority. Unfortunately, many companies still store data without encryption, creating
Our Customers







