top of page
1280px-Thales_Logo.svg.png

ENCRYPTION SOLUTION

THALES SAFENET PROTECTDB

image-asset (5).png

SafeNet ProtectDB provides transparent column-level encryption of structured, sensitive data residing in databases. Customers use our database encryption solution to protect credit card numbers, social security numbers, national ID numbers, passwords, account numbers and balances, email addresses, and more. 

The solution enables large amounts of information to be rapidly moved in and out of data stores by efficiently encrypting and decrypting specific fields in a database. No changes are required to associated applications, and SafeNet ProtectDB can scale to support multiple data centers in on-premises, virtual, and public cloud environments.

ADDITIONAL SAFENET PROTECTDB HIGHLIGHTS:

  • Works in tandem with Gemalto's FIPS 140-2 up to Level 3 validated SafeNet KeySecure enterprise key manager to provide centralized administration of all keys and policies

  • Granular access controls can be applied based upon role, user, time of day, and other variables, including the ability to prevent database administrators (DBAs) from impersonating another user

  • Built-in and automated key rotation and data re-keying 

  • Comprehensive logging and auditing capabilities to track access to encrypted data and keys

  • Ability to offload database encryption to SafeNet KeySecure for external processing power

image-asset.png

ADDRESS A WIDE VARIETY OF USE CASES AND DATABASE ENCRYPTION NEEDS WITH SAFENET PROTECTDB:

  • Secure structured financial data

  • Protect structured personally identifiable information

  • Meet compliance and regulatory mandates, including PCI DSS

  • Secure structured data in the cloud

  • And more

SAFENET PROTECTDB FEATURE

  • Transparent and efficient database encryption of sensitive column-level data

  • Works in tandem with Gemalto’s FIPS 140-2 up to Level 3 validated SafeNet KeySecure enterprise key manager to provide complete ownership and centralized administration of all keys and policies 

  • Granular access controls can be applied based upon role, user, time of day, and other variables, including the ability to prevent database administrators (DBAs) from impersonating another user

  • Built-in and automated key rotation and data re-keying 

  • Comprehensive logging and auditing capabilities to track access to encrypted data and keys

  • Ability to offload database encryption to SafeNet KeySecure for external processing power

SAFENET PROTECTDB BENEFITS

  • Persistent Database Protection- Ensure encrypted data remains secure throughout its lifecycle, while enabling authorized users and processes to access protected information when necessary 

  • Efficient Encryption - Focus on select fields to encrypt and decrypt data efficiently, in a fraction of the time that it might take for the entire file 

  • Secure Collaboration- Combine flexible encryption options with granular access control policy capabilities to encourage collaboration and avoid the all-or-nothing approach of other encryption solutions

  •  Cloud-ready- Move forward with cloud and virtualization initiatives to realize the business benefits of these models—without compromising your security posture or giving up control and ownership of your data and keys

  • Ensure Compliance - Effectively address your internal policies and all relevant regulatory mandates, including encrypting personally identifiable information (PII) and other sensitive, confidential data to comply with privacy mandates such as, Payment Card Industry Data Security Standard (PCI DSS) and the Health Insurance Portability and Accountability Act (HIPAA)

bottom of page