KEY AND CERTIFICATE VAULTING

Vormetric Data Security Use Cases

Establishing a Secure Vault for Your Keys and Certificates with Vormetric

As the scope and volume of encryption continues to grow in enterprises, so too do the number of keys and certificates. This proliferation of cryptographic assets can create a huge administrative burden—and even bigger security vulnerabilities if effective safeguards aren’t in place. The Vormetric Data Security Platform can help you address both of these management issues.

With Vormetric, you can establish a vault for centrally and securely managing all your cryptographic policies and assets. By leveraging the Vormetric Data Security Platform, your security teams can avoid the cost and effort of having to support multiple key managers—and more easily ensure keys are properly stored, secured, and backed up. The solution offers these capabilities:

  • Unified key and certificate management. The Vormetric Data Security Platform enables enterprises to minimize encryption and key management costs by providing an appliance to manage heterogeneous symmetric and asymmetric encryption keys, including keys generated by the Vormetric products, IBM InfoSphere, Guardium Data Encryption, Oracle TDE, Microsoft TDE, and KMIP-compliant encryption products. In addition, the platform features support for X.509 certificates.
  • Flexible, extensible management. With the Vormetric Data Security Platform, encryption keys and certificates can be added to the key storage system via a graphical user interface or through an application programming interface (API) that enables efficient and secure management of high volumes of keys and certificates.
  • FIPS-validated appliance. With the Vormetric Data Security Platform, all keys, certificates, and encryption policies can be managed in a centralized, secure fashion, using the Vormetric Data Security Manager. Vormetric Data Security Manager is offered as either a virtual or physical appliance, and the hardware appliance is available with FIPS 140-2 Level 2 and FIPS 140-2 Level 3 validation.
  • Strong, auditable administrative controls. Strong separation-of-duties policies can be enforced to ensure that one administrator does not have complete control over data security keys or administration. The Vormetric Data Security Platform provides extensive audit capabilities that can be used to report on all activities relating to key usage, including key generation, rotation, destruction, import, expiration, and export.
  • High performance and availability. To maximize uptime and security, the Vormetric Data Security Manager features redundant components and the ability to cluster appliances for fault tolerance and high availability.

Follow these links to learn more about our solutions:

WEBCAST

Cloud Data Encryption Myths Debunked

Cloud Data Encryption Myths Debunked

Controlling data encryption and key management is a MUST in the cloud.

Watch Now >>

CASE STUDY

TAB Bank

Vormetric on cybersecurity

TAB Bank enjoys compliance with banking regulations and PCI DSS with protection from Vormetric Data Security

Read More >>

CUSTOMER QUOTE

 We’ve never had a Vormetric Data Security Manager appliance fail, or even falter. The separation of key operators, key creator, policy, administrator, access controls, and the separation of duties model are all truly military grade; and I have a lot of experience in this field! 

Sabastian High
Senior Manager for Product Development Standards and Innovation
McKesson

WHITE PAPERS

Encryption Architecture

Vormetric Key Management

Download >>

The Vormetric Digital Digest on Data Security

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental