U.S. FEDERAL GOVERNMENT DEPARTMENT OF DEFENSE

Vormetric Data Security Solutions

The DoD has challenges of sharing critical data related to mission, supply chain, finance and personnel across departments as well as with coalition partners. This does not come without risk and presents multiple opportunities for cyber attacks to capitalize on vulnerabilities to access critical data that may impact mission success or the lives of our warfighters.

These Agencies and Departments are faced with:

  • Insider threats, such as those illustrated by Snowden and Manning
  • Stolen credentials and advanced persistent threats (APTs)
  • The need to comply with Federal mandates and regulations
  • The need for large scale deployments as well as tactical agile compute environments
  • The need to move to the Cloud while maintaining data center operations

The information driving missions needs to be secured, several key examples would be:

  • Forward deployed IT at the theater edge
  • Mobile field units, including drones and other hardware
  • Allowing secure access to data across communities of interest in a Big Data environment
  • Large amounts of PII and PHI
  • Data center consolidation (joint information environment [JIE] and joint regional security stack [JRSS]) are impacting decisions relative to consolidation
  • Closing “air gaps” in storage infrastructure to reduce risk and mobility during mission
  • More

Moreover, data managers in the Defense community must do all this in tight time frames and budgets.

The Vormetric Approach

Vormetric Data Security solutions help the DoD comply with all these requirements wherever they keep data through:

  1. Data-at-rest encryption
  2. Secure chain of custody and least privilege
  3. Removing data access from privileged roles such as Sysadmin and Root to mitigate insider threat
  4. Suppressing field values in database/big data scenarios to protect critical mission and personal data

Vormetric Data Security solutions:

  • Are rapid deployment to gain concise mission alignment
  • Meet or exceed IC related requirements relative to cryptographic standards (i.e. Suite B)
  • Deploy a strategic, data centric approach for the enterprise

The Vormetric platform installs seamlessly across Windows, LINUX, and UNIX operating systems with a very low impact to compute resources and no impact to storage or the network.

How Vormetric Solutions Work

The Vormetric Data Security Platform is the only solution with a single extensible framework for protecting data-at-rest under the diverse requirements of Federal Defense Agencies and Departments across the broadest range of OS platforms, databases, cloud environments and big data implementations. The result is low total cost of ownership, as well as simple, efficient deployment and operation.

  • Vormetric Transparent Encryption provides file and volume level data-at-rest encryption, secure key management and access controls required by regulation and compliance regimes.
  • Vormetric Data Security Intelligence provides another level of protection from malicious insiders, privileged users, APTs and other attacks that compromise data by delivering the access pattern information that can identify an incident in progress.
  • Vormetric Application Encryption enables agencies to easily build encryption capabilities into internal applications at the field and column level.
  • Vormetric Key Management enables centralized management of encryption keys for other environments and devices including KMIP compatible hardware, Oracle and SQL Server TDE master keys and digital certificates.
  • Vormetric Tokenization with Dynamic Masking lets administrators establish policies to return an entire field tokenized or dynamically mask parts of a field. With the solution’s format-preserving tokenization capabilities, you can restrict access to sensitive assets, yet at the same time, format the protected data in a way that enables many users to do their jobs.

Compliance

Vormetric security solutions are designed to help you comply with:

Be Protected in Weeks not Months Whatever Your OS

Vormetric works with the DoD to install its Data Security solutions in days/weeks rather than months. The Vormetric solutions work with most major operating systems, including Linux, UNIX and Windows servers in physical, virtual, cloud and big data environments.

Easy to Use and Won’t Hurt System Performance

Vormetric Data Security makes it simple to solve security and compliance concerns by simultaneously defending data in databases, files and Big Data nodes across public, private, hybrid clouds and traditional infrastructures. Central management of the entire data security platform makes it easy to extend data security protection and satisfy compliance requirements across the entire Agency, Department, or Program. Expanding deployments are rapid and can be accomplished without adding new hardware, or increasing operational burdens.

Customers typically report no perceptible impact to end-user experience when using Vormetric solutions. Vormetric performs encryption and decryption operations at the optimal location of the file system or volume manager taking advantage of hardware cryptographic acceleration, such as Intel® Advanced Encryption Standard-New Instructions (Intel® AES-NI) and SPARC Niagara Crypto, to speed the encryption and decryption of data.

Collectively, this leads to the most cost-effective solution on the market. For more information, contact us.

WHITE PAPERS

A Dangerous Cyber Convergence: Persistent Insiders, Evolving Adversaries

The White House has made cybersecurity a top government - wide priority, and agencies

Download >>

FAQ

The Stand –Vormetric on Cybersecurity

Vormetric on cybersecurity

Vormetric's VP of Product Management shares his views on the current issues and how budget-constrained agencies can defend against advanced persistent threats.  

Download >>

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental