Datapipe has chosen to partner with Protegrity to deliver a high performance, enterprise-class software solution that secures sensitive data in databases through encryption, monitoring, masking and tokens.
The Protegrity Database Protector provides a comprehensive database security solution for most major databases utilised in the market today. It enables column-level data protection in databases, storage and backup systems by employing powerful encryption, masking, monitoring and tokenisation methods with strong access and usage controls.
To achieve maximum protection of data and maintain the best system performance, Protegrity provides a solution that allows implementation of encryption down to the column level within the database.
- Strong Encryption - is provided with several alternative algorithms including 3DES, AES-128 and AES-256 algorithms, and with the use of CBC, IV (Initialization Vector), and CRC (Cyclic Redundancy Check) for the encrypted data.
Protegrity Database Protector utilises a Data Security Policy that controls enforcement. The Policy consists of a set of protection attributes that are stored in a security catalog or database that is kept separate from the database where the data being protected is residing. The method used to protect data in a database with the use of the security catalogue is protected by the U.S. Patent No. 6,321,201.
The Database Protector delivers the option to utilise tokens, or replacement values, to reduce the impact of compliance and to improve transparency. For more information please see the Protegrity Data Tokenization Fact Sheet.
Performance and Scalability
Database Protector takes full advantage of the processing power offered by the database server and keeps machine cycles to a minimum, thus optimising performance.
Cross Platform Support
Database Protectors are available on all leading standard Linux, UNIX or Windows environments, as well as IBM iSeries and zSeries environments, in conjunction with all major relational databases.