• Vormetric Key Management as a Service
  • Thales e-Security + Vormetric = Better Together
  • Vormetric Live Data Transformation
  • 2016 VORMETRIC DATA THREAT REPORT
  • ahora es más fácil y menos costoso proteger los datos estáticos. obtenga información ahora
  • REACH NEW HEIGHTS IN CLOUD SECURITY.
  • A los usuarios les encanta compartir archivos en la nube ahora, usted también puede hacerlo. obtenga más información ahora
  • ahora puede ocultar los datos sensibles a simple vista.
  • Los datos masivos generan grandes interrogantes de seguridad.
  • No debe limitar su elección de seguridad en la nube.

Soluciones de seguridad de datos

Vormetric aborda las exigencias de cumplimiento de la industria y las reglamentaciones gubernamentales en el mundo mediante la protección de datos en infraestructuras físicas, virtuales y de nube, mediante cifrado de datos, administración de claves, políticas de acceso, control de usuarios con privilegios e inteligencia de seguridad.

Clientes Protegidos

155 PETABITS + 1 MIL MILLONES DE DATOS + TRANSACCIONES COMERCIALES EN 22 PAÍSES MÁS DE
500.000 SERVIDORES 17 DE LAS 30 EMPRESAS DE LA REVISTA FORTUNE MÁS DE 1.500 CLIENTES

Data Security Resource Center

Analyst Reports
  • Analyst Reports
  • Data Security Blog
  • Customer Success
  • Solution Briefs
  • Videos
  • Webcasts
  • White Papers

Analyst Reports

Peak 10 launches encryption as a Servi...

The 451 Take

Managed infrastructure providers can and do help supply their customers with...

DOWNLOAD >>

Gartner Market Guide for Merchant/Acqu...

The tokenization of sensitive data is a key component in the ensuring of payment system security...

DOWNLOAD >>

Data Security Blog

Last year we hit a turning point in cloud adoption for applications processing sensitive data.  According to our latest Ponemon/Thales Global Encryption Trends Study, for the first time more enterprises are sending sensitive data to the cloud than...

I’m sure you’ve seen endless articles about organizations jumping on the cloud computing bandwagon. I know what you’re thinking, how very 2013. But there is a fast growing trend in this shift to the “cloud” movement with enterprises increasingly d...

Customer Success

Trapwire Enhances Its Security...

Founded in the wake of the September 11th, 2001 attacks on the U.S., TRAPWIRE puts data analysis to work to keep the country safe. Paul Chadha, director of products and technology, explained, “We...

DOWNLOAD >>

Japanese Hospital Network Leverages...

The St. Marianna Association is a network of hospitals and a medical school in the greater Tokyo area. Founded shortly after World War II, it pioneered treatment for displaced civilians and soldiers...

DOWNLOAD >>

Solution Briefs

Key Management For Salesforce Shiel...

Salesforce Shield Platform Encryption service is a powerful tool to secure and control sensitive fields and attachments through natively integrated data-at-rest encryption. However, to meet many...

DOWNLOAD >>

Dell Storage SC Series & Vormet...

For IT and security teams today, adaptation is a key part of the job. Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms,...

DOWNLOAD >>

Videos

Demo: Vormetric Content Packs on McAfee Enterprise...

View how Vormetric Content Packs work with McAfee ESM to provide an "inside view" feed in order to guard against the insider threat.

VIEW >>

Vormetric Transparent Encryption Demo

Watch this short demo to learn how Vormetric Transparent Encryption makes it easy to deploy file and database encryption with privileged user access controls and security intelligence log collection across all your server...

VIEW >>

Webcasts

Webinar: Protecting Your Data at Rest in Apache Kafka

Date: Thursday, September 8, 2016 Time: 10am PT | 1pm ET | 7pm CET This webinar will cover the basics of Apache Kafka and the broader Confluent Platform ACL authentication and policy-driven encryption practices for data-at-rest and secure platform...

VIEW >>

Webinar: Protecting Data in line with the Australian Data Breach Notification – A Best Practice Guide.

Date: Thursday 15th September, 2016 Time: 4.00pm Sydney Time Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the...

VIEW >>

White Papers

Hadoop with Vormetric Transparent...

Hadoop has rapidly gained acceptance in the enterprise and is becoming a central repository for all the data in an enterprise. The data is extensively mined and analyzed by several different...

DOWNLOAD >>

Discover How to Efficiently...

The cyber attacks being waged against government agencies continue to get more frequent, fast changing, and evasive. The Department of Homeland Security (DHS) created the Continuous Diagnostics...

DOWNLOAD >>

EXPERT QUOTE

U.S. retailers, are protecting data for the right reasons, and nearly half have a good track record of safeguarding sensitive data. Protecting reputation and brand integrity was the top reason for securing sensitive.

Garrett Bekker
Senior IT Security Analyst
451 Research

GARTNER NEWSLETTER

Enterprise Data Security for Cloud Environments

Market Guide for Tokenization Vendors

Download >>

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental