Strengthen Security while Minimizing Disruption and Costs

Robust data-at-rest security capabilities for Teradata environments

Vormetric Protection for Teradata Database

By aggregating massive volumes of enterprise data in Teradata database environments, businesses can gain unprecedented insights and strategic value. Unfortunately, this very aggregation of data can also present unprecedented risks. Now, Vormetric enables your organization to guard against these Teradata database security risks. Vormetric Protection for Teradata Database makes it fast and efficient to employ robust data-at-rest security capabilities in your Teradata environments.

Vormetric Protection for Teradata Database
Simplifies Encryption Deployments

Enables efficient encryption of specific fields and columns in Teradata databases, and can encrypt sensitive records without altering their format or field schemas.

Centralizes Key and Policy Management

Works seamlessly with the Vormetric Data Security Manager, so you can centrally manage keys and access policies for encryption products from Thales e-Security and other vendors.

Reduces Development Complexity

Reduces complexity for developers by offering standards-based application programming interfaces (APIs) and user-defined functions (UDFs) that can perform cryptographic and key management operations.

Robust Security

The solution offers granular protection, enabling encryption of specific fields and columns in Teradata environments. With the solution, you can apply unique keys to different columns. As a result, you can enforce granular controls so administrators can perform operational tasks, without accessing sensitive data in the clear. Further, the solution features a hardened, FIPS-certified appliance for administration and key storage.

High Performance

With Vormetric Protection for Teradata Database, you can harness the high performance required to support your processing-intensive big data environments. The big data security solution efficiently scales with the number of Teradata nodes in your environment.

Non-Disruptive Implementation

The solution offers format-preserving encryption capabilities that minimize the storage increase and disruption associated with encryption. The solution's UDFs for encryption and decryption can easily integrate into existing SQL code. With the solution, Teradata users can set up their own easily configurable profiles for submitting encryption and decryption requests, including choosing from standard AES encryption and format-preserving encryption.

Teradata database minimum version 14.0
SUSE Linux Enterprise Server (SLES) minimum versions 10
Maximum column widths

ASCII—16KB, Unicode UDFs—8KB

Separation of duties

Administrators manage infrastructure without clear-text data access

Column-level protection

Schema preserving encryption

Centralized key management

Teradata database, Hadoop, and other environments

Solution Brief : Vormetric Protection for Teradata Database

Vormetric Protection for Teradata Database from Thales e-Security gives your organization the comprehensive encryption and granular access controls required to secure the most sensitive assets across your Teradata environments, while enabling you to maximize the business benefits of your big data investments. Read the solution brief!

Download

White Paper : Quantifying the Cost of a Data Breach by Industry

What will a data breach cost your business? This Aberdeen Report extends on its previous work and leverages the Verizon Data Breach Report (DBIR) to analyze what the cost of an average breach cost by industry. It also provides an analysis and recommendations as to how to avoid the breach altogether.

Download

White Paper : Enhanced Protection For Teradata Environments

As enterprise organizations continue to make increasing use of sensitive business data to gain competitive advantage, data security needs to be a primary consideration at the very beginning of these projects. Failure to provide adequate protection from day one will inevitably mean problems further down the line.

Download
Mire nuestra demostración interactiva Explorar
Programe una demostración en vivo Programar
Comuníquese con un especialista Contacto