Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
DATA SHEET
Corporate Overview
Data is transforming businesses with new insights and opportunities. As it continues to amass exponentially, so too does the risk generated by unsecured sensitive data. Such sensitive data can be found across multiple heterogeneous systems, applications, and platforms inside and outside of the enterprise, making consistent data security and visibility extremely challenging.
Secure sensitive data and maintain the freedom to use it to transform and innovate
Pioneers of the data security industry and known for innovation, Protegrity is changing the way enterprises secure and leverage sensitive data. Protegrity’s award winning and innovative data-centric security is backed by over 30 industry patents, all of which provide superior protection and usability unique to the Protegrity Data Security Platform.
Key Benefits
Proven, Unified Security
Organizations of all sizes use Protegrity to secure sensitive data within their databases, files, and applications while leveraging centrally controlled data security policy, keys, and auditing. Protegrity simplifies compliance with ever-changing regulatory requirements, all while maintaining critical accessibilityfor infrastructure management and business insight.
Native access control is combined with Protegrity’s centralized policy-level control and data security for multiple layers of protection. Protegrity’s Enterprise Security Administrator provides a Separation of Duties to isolate security administration to Security Officers, further protecting data from external and internal (privileged user) threats.
ASSESS PROTECT
AUDIT & REPORT
Know Data Flow Close Data Gaps
Track Usage & Alert
Application
NoSQL
Hadoop Application
Database
File Server
Mainframe
EDWSaaS
CLOUD
BIGDATA
DATACENTER
ENTERPRISESECURITY
ADMINISTRATOR
DATA PROTECTORS
Scalable Performance
Professional & Customer Enablement Services
Protegrity end-to-end data security includes a highly skilled Professional Security Services team to establish a corporate data protection strategy, followed by optimized deployment and implementation. Protegrity’s continuous protection, and impeccable Support and Customer Enablement Services teams maintain the highest level of data security after implementation.
Protegrity provides the only unified data security platform that protects diverse sensitive data across the enterprise - in applications, data warehouses, mainframes, big data and cloud environments. We help organizations manage risk, achieve compliance, and safeguard data using encryption and tokenization technologies that integrate seamlessly into the business.
USA (HQ)
333 Ludlow StSouth Tower, 8th FloorStamford, CT 06902 USA Tel + 1 203 326 7200
UK Suite 2First FloorBraywick House WestWindsor RoadMaidenhead, Berkshire SL6 1DNTel + 44 1494 857762
www.protegrity.com
Beyond the industry leading benchmarks for the unique Protegrity Vaultless Tokenization technology, Protegrity also leverages parallel processing and clustering, where available, to provide strong, flexible security with optimal performance and availability. Protegrity Data Protectors can be deployed directly on nodes to allow for high performance in-process data tokenization with greatly reduced bottlenecks in performance and scalability.
DATA SHEET
“Protegrity Vaultless Tokenization did exactly what we needed. It is easy to install, flexible, extremely proficient with regards to performance and above all - secure.”
— Leif Gyllsdorff, IT Security & GRC Security, Preem
Flexible Deployment for Enterprise and Cloud
Designed for large and small deployments, Protegrity applies data security policies consistently across big data, databases, cloud applications, file servers, applications and more. Protegrity makes it easy to manage the security of data within various systems by integrating Protegrity Data Protectors and Gateways at and between various endpoints.
Protegrity enforces consistent, efficient data security enterprise-wide, and unifies all auditing and reporting into a single interface. Gateway technology enables this same consistent security to be enforced on data before it is sent to the cloud.
Methods of Data Security
Protegrity data-centric security protects the data itself – providing the highest level of security – at rest, in transit, and in use, with a variety of Data Security Methods, including patented Protegrity Vaultless Tokenization (PVT), masking, strong encryption, data-type-preserving encryption, and monitoring.
Masked data and tokens can also be embedded with business intelligence to allow for seamless analysis without the need to re-identify the data.