Data encryption

Protects data stored in the cloud from unauthorized access through encryption and data access control policies.

TALK TO OUR EXPERTS

The IBM Security Guardium Data Encryption (GDE) solution allows encrypting and controlling access to data stored in directories and volumes of file and database servers (data files and log files), without the need to change the applications that access the data .

The GDE provides centralized and secure management of cryptographic keys (FIPS 140-2 level 1 certification), allowing the generation of reports on the use of encryption keys and directories protected by the solution.

It is possible to create symmetric cryptographic keys using the AES128, AES 256, ARIA128 and ARIA256 algorithms.

The Live Data Transformation feature (patented) allows users and applications to access data during initial data encryption and encryption key rotation operations, avoiding long downtimes.

The GDE solution supports the use of cryptographic resources incorporated in the CPUs of protected servers (AMD and Intel AES-NI processors), offering greater speed in the execution of cryptographic operations and less impact on the performance of the environment.

IBM Security Guardium Data Encryption (GDE) Solution Differentials

IBM Security Guardium Data Encryption (GDE)

It does not require changes to applications that access transparently encrypted data.
Allows users and applications to access data during initial encryption and cryptographic key rotation (Live Data Transformation feature).
Leverages hardware encryption capabilities built into the protected server’s CPUs (AMD and Intel AES-NI processors).
Database encryption
(tablespace, data file e log file).
Allows generation of full and incremental backup of encrypted databases.
Provides centralized and secure management of cryptographic keys (FIPS 140-2 Level 1 certified).
Provides segregation of duties.
Allows controlling access to encrypted data through policies defined in the solution’s Web console.

The Anatomy of an Attack

Our Differentiators