Vormetric Transparent Encryption provides the following security features-
  • Define Granular Access Controls- Allows access controls for system-level users and groups as well as LDAP, Active Directory, Hadoop and Container users and groups. It ensures to implement privileged user access controls to enable administrators to work as usual but protect against users and groups that are potential threats to data.
  • High-Performance Hardware-Accelerated Encryption- The software employs strong, standard-based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and elliptic curve cryptography (ECC) for key exchange. The agent is FIPS 140-2 Level 1 validated. The overhead from encryption is minimized using the encryption capabilities available in modern CPUs. To eliminate the bottleneck and latency that plague legacy proxy-based encryption solutions, a distributed agent-based model is deployed.
  • Broadest Operating System and Environment Support- Secure structured databases and unstructured files across data centers, cloud, containers and big data environments on Linux, Windows and Unix with a single infrastructure and management environment.
  • Comprehensive Security Intelligence- Detect and stop threats quicker with detailed data access audit logs that not only satisfy compliance and forensic reporting requirements but also enable data security analytics. Pre-built integration and dashboards that make it easy to find denied-access attempts to protected data are available for major system vendors.

USP :

Vormetric Transparent Encryption enterprise encryption software provides data-at-rest encryption with centralized key management, privileged user access control, and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data, and container environments. The deployment is user-friendly, easy, scalable and quick, with agents installed at operating file-system or device layer, and encryption and decryption are transparent to all applications that run above it. The software is designed to meet data security compliance and best practice requirements with minimal disruption, effort, and cost.

BUYERS
VENDORS
EXPERTS
2.7
ANALYSTS
 

THALES GROUP detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
3.0
3.8
3.7
Breadth and Depth of Product Offerings
3.15
4.30
3.95
Product Features and Functionality
3.35
4.00
3.60
Focus on Product Innovation
2.75
2.55
3.40
Product Differentiation and Impact on Customer Value
5.00
5.00
5.00
Product Differentiation and Impact on Customer Value
1.25
3.50
3.00
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

THALES GROUP has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    20 Participants

  • Niche Quadrant

    All-Asia-Pacific

    23 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity
    Product Differentiation and Impact on Customer Value
  • Product Maturity / Services Offered
    Consulting Services
  • Product Maturity / Services Offered
    Managed Security Services
  • Product Maturity / Services Offered
    Support and Maintenance
  • Product Maturity / Technology
    Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
  • Product Maturity / Technology
    Product Variants
  • Product Maturity / Technology
    Security Information And Event Management (Siem)
  • Product Maturity / Technology
    Unified Threat Management (Utm)
  • Product Maturity / Software Offered
    Access Control
  • Product Maturity / Software Offered
    Backup and Recovery
  • Product Maturity / Software Offered
    Big Data Governance
  • Product Maturity / Software Offered
    Security Intelligence
  • Product Maturity / Software Offered
    Technology
  • Product Maturity
    Focus on Product Innovation
  • Product Maturity
    Product Features and Functionality
  • Product Maturity / Data Type
    Data in Motion
  • Product Maturity / Product Features and Functionality
    Type of Channels
  • Product Maturity / Breadth and Depth of Product Offerings
    Solutions Offered
  • Product Maturity / Focus on Product Innovation
    R&D Spend
WEAKNESSES

Have you EVER used THALES GROUP Products?

Share your experience with potential buyers.

TOP FEATURES
  • Software Offered
    Security Intelligence
  • Software Offered
    Backup and Recovery
  • Services Offered
    Managed Security Services
  • Software Offered
    Big Data Governance
  • Technology / Intrusion Detection System/Intrusion Prevention..
    IPS)
  • Product Features and Functionality
    Data Type
  • Technology
    Product Variants
  • Technology
    Security Information And Event Management (S..
  • Services Offered
    Support and Maintenance
  • Software Offered
    Access Control

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

THALES GROUP Presence in Big Data Security Solutions

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS