• Vormetric Live Data Transformation
  • Vormetric Thales Orchestrator
  • Vormetric Key Management as a Service
  • Thales e-Security + Vormetric = Better Together
  • 2016 VORMETRIC DATA THREAT REPORT
  • ahora es más fácil y menos costoso proteger los datos estáticos. obtenga información ahora
  • REACH NEW HEIGHTS IN CLOUD SECURITY.
  • A los usuarios les encanta compartir archivos en la nube ahora, usted también puede hacerlo. obtenga más información ahora
  • ahora puede ocultar los datos sensibles a simple vista.
  • Los datos masivos generan grandes interrogantes de seguridad.
  • No debe limitar su elección de seguridad en la nube.

Soluciones de seguridad de datos

Vormetric aborda las exigencias de cumplimiento de la industria y las reglamentaciones gubernamentales en el mundo mediante la protección de datos en infraestructuras físicas, virtuales y de nube, mediante cifrado de datos, administración de claves, políticas de acceso, control de usuarios con privilegios e inteligencia de seguridad.

Clientes Protegidos

155 PETABITS + 1 MIL MILLONES DE DATOS + TRANSACCIONES COMERCIALES EN 22 PAÍSES MÁS DE
500.000 SERVIDORES 17 DE LAS 30 EMPRESAS DE LA REVISTA FORTUNE MÁS DE 1.500 CLIENTES

Data Security Resource Center

Analyst Reports
  • Analyst Reports
  • Data Security Blog
  • Customer Success
  • Solution Briefs
  • Videos
  • Webcasts
  • White Papers

Analyst Reports

Quantifying the Cost of a Data Breach...

By Derek E.Brink, CISSP, Vice President and Research Fellow, IT Security and IT GRC

This...

DOWNLOAD >>

Vormetric Key Management for Software-...

The use of SaaS applications such as a salesforce.com, ServiceNow, Workday, Box, and others has...

DOWNLOAD >>

Data Security Blog

In looking back at 2016, it’s hard to imagine that any of us would have contemplated the impact of the Wiki leaks email and the implications that a foreign government was involved – and could have influenced the outcome of the U.S. presidential el...

For quite some time now, we’ve been running consumer surveys around the world through global survey provider Wakefield on topics that are of interest to not just people like you and I, since I assume most people who will read this have some...

Customer Success

Kellogg’s Relies on Vormetric for...

Best known for brands such as Frosted Flakes, Rice Krispies, Special K, Cocoa Krispies, Pringles, Pop-Tarts, Cheez-It, Eggos, Kashi, and Nutri-Grain; Battle Creek, Michigan-based Kellogg Company (...

DOWNLOAD >>

Vormetric Prescribes Performance,...

As one of North America’s premier drug store chains this company handles large amounts of sensitive personal and business-related information.

DOWNLOAD >>

Solution Briefs

Thales Orchestrator & Vormetric...

The demands for encryption, a practical solution to modern security threats and compliance mandates, continue to grow. Security teams need to support more deployments, larger implementations, and...

DOWNLOAD >>

Key Management For Salesforce Shiel...

Salesforce & Vormetric ensure you maintain trust, control and compliance of your sensitive data in Salesforce

Salesforce Shield Platform Encryption service is a powerful tool to secure...

DOWNLOAD >>

Videos

2016 Data Threat Report

The Data Threat Report, a partnership of Vormetric and 451 Research, analyzes survey data from over 1,100 senior security executives around the world. Risks are identified, regional and industry trends are examined and the most...

VIEW >>

Demo: Vormetric Content Packs on McAfee Enterprise...

View how Vormetric Content Packs work with McAfee ESM to provide an "inside view" feed in order to guard against the insider threat.

VIEW >>

Webcasts

Webinar: How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security

Date: October 26, 2016 A Joint Nutanix – Vormetric Webcast Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern...

VIEW >>

Achieving Compliance in the Cloud

Date/Time: August 17, 2016 11:00 PT There’s an internal tug-of-war playing out across organizations like yours: While the cost-savings and accelerated efficiencies of cloud are undeniable, data protection is a must. Any move towards dynamic IT...

VIEW >>

White Papers

Enhanced Protection For Teradata...

As enterprise organizations continue to make increasing use of sensitive business data to gain competitive advantage, data security needs to be a primary consideration at the very beginning of...

DOWNLOAD >>

How Format-Preserving Encryption...

Fortrex Qualified Security Assessors (QSA) have authored this important white paper to help clarify the PCI DSS position on when and how to use Cryptographic Tokens, Tokens created using Format...

DOWNLOAD >>

EXPERT QUOTE

U.S. retailers, are protecting data for the right reasons, and nearly half have a good track record of safeguarding sensitive data. Protecting reputation and brand integrity was the top reason for securing sensitive.

Garrett Bekker
Senior IT Security Analyst
451 Research

DATA SECURITY

THE VORMETRIC DIGITAL DIGEST ON DATA SECURITY

In today’s competitive environment, enterprises earn their customers’ trust every day.

Download >>

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental