Common encryption platform for the widest range of database environments

Reduce the risk of a breach with nCipher database encryption and key management solutions

Database Encryption

nCipher HSMs enable enterprises to protect their most sensitive keys from both internal and external threats, and comply with data protection mandates. With nCipher HSMs, you can take full advantage of native database encryption capabilities and still add higher levels of assurance to key management activities, ensuring optimal security, efficiency, and guaranteed accessibility to encrypted data.

Database Encryption Resource Center

Learn More
Central Point of Failure

Databases represent a central aggregation point—and a focal point for thieves. Your databases, whether on-premises or in the cloud, hold the data that matters to your business and that is prized by would-be attackers.

Insufficient Security Controls

Insufficient security controls expose your organization to fraud and data breaches. For example, when key management is handled within the database, the DBA has control of both the data and key. Database encryption solutions often disregard the potential for insider abuse, as well as advanced persistent threats, where an attacker imitates a privileged user.

Lost Keys

Key loss can render data unavailable, since decryption would be impossible—disrupting business operations.

Thales nShield HSM Key Protection

For environments that require higher levels of security, nCipher HSMs deliver FIPS-certified protection for your database keys. Available in multiple form factors, nShield HSMs help you meet your needs for high assurance security and compliance, and serve environments ranging from desktop databases to single-server databases to database applications distributed across a network—all while safeguarding keys in a hardened solution.

Simplified Compliance

Simplify data privacy compliance obligations and reporting activities through the use of a security-certified encryption and key management to enforce critical best practices and other standards of due care.

Separation of Duties

Enforce separation of duties by isolating master keys from encrypted data, reducing the threat of an insider attack.

Reduced Costs

Maximize efficiency by reducing administration costs associated with managing keys in large-scale database environments with nCipher’s industry-leading Security World key management architecture.

Solution Briefs : Database Encryption Solutions

In today’s enterprises, databases house some of the most highly sensitive, tightly regulated data—the very data that is sought after by malicious insiders and external attackers. To safeguard against the kinds of database attacks that have dominated security headlines recently, organizations are increasingly implementing strong database encryption strategies.

Download this solution brief to learn how Thales can help you protect your critical data against both insider and external threats.

Download

Research and Whitepapers: A Common Platform for Database Encryption: Lower Cost, Reduced Risk

Most enterprises rely on a diverse database infrastructure to meet specific business objectives, but this complexity increases risk and costs. With databases housing our most sensitive and highly regulated information, organizations need better database security strategies.

Download

Solution Brief : TDE Key Management

Microsoft SQL Server and Oracle Database solutions provide native transparent database encryption (TDE) that protects the data stored in their customers’ databases. Managing the TDE keys presents challenges such as isolating them from the assets they protect and storing them securely. Thales key management solutions centralize key management for Microsoft SQL Server and Oracle Database, providing greater command over the keys while increasing data security.

Download

Solution Briefs : Vormetric Transparent Encryption

Vormetric Transparent Encryption delivers data-at-rest encryption, privileged user access controls and security intelligence logs to proactively meet compliance reporting requirements for structured databases and unstructured files. With Vormetric Transparent Encryption, IT and security professionals can efficiently safeguard more data, in more environments, and against more threats as sensitive data moves into cloud deployments, big data platforms, virtualized systems and more.

Download

Research and Whitepapers : Vormetric Application Encryption

Vormetric Application Encryption reduces the complexity and costs associated with meeting this requirement, simplifying the process of adding encryption capabilities to existing applications. This architecture paper goes into detail of the security model, best practices, APIs, and offers a sample application encryption library.

Download
Want to be part of our team? Explore
Get in contact with a specialist Contact Us