Are you from this Company ?
La Defense, France
$10BN to $50BN
60 Buyers are Negotiating "Group Buyer Deal"


Vormetric Transparent Encryption enterprise encryption software provides data-at-rest encryption with centralized key management, privileged user access control, and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data, and container environments. The deployment is user-friendly, easy, scalable and quick, with agents installed at operating file-system or device layer, and encryption and decryption are transparent to all applications that run above it. The software is designed to meet data security compliance and best practice requirements with minimal disruption, effort, and cost.

Request THALES GROUP Pricing to get more information.


Vormetric Transparent Encryption provides the following security features-
  • Define Granular Access Controls- Allows access controls for system-level users and groups as well as LDAP, Active Directory, Hadoop and Container users and groups. It ensures to implement privileged user access controls to enable administrators to work as usual but protect against users and groups that are potential threats to data.
  • High-Performance Hardware-Accelerated Encryption- The software employs strong, standard-based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and elliptic curve cryptography (ECC) for key exchange. The agent is FIPS 140-2 Level 1 validated. The overhead from encryption is minimized using the encryption capabilities available in modern CPUs. To eliminate the bottleneck and latency that plague legacy proxy-based encryption solutions, a distributed agent-based model is deployed.
  • Broadest Operating System and Environment Support- Secure structured databases and unstructured files across data centers, cloud, containers and big data environments on Linux, Windows and Unix with a single infrastructure and management environment.
  • Comprehensive Security Intelligence- Detect and stop threats quicker with detailed data access audit logs that not only satisfy compliance and forensic reporting requirements but also enable data security analytics. Pre-built integration and dashboards that make it easy to find denied-access attempts to protected data are available for major system vendors.


Add Requirements
Added Requirements
“I am looking for a Big Data Security Solutions in north America. My budget is $50,000. Looking to buy in 15 days.”
Select Vendors
60 Buyers Negotiating
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
  • +13
    Breadth and Depth of Product Offerings
  • +6
    Product Differentiation and Impact on Customer Value
  • +7
    Consulting Services
  • +6
    Managed Security Services
  • +8
    Support and Maintenance
  • +8
    Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
  • +6
    Product Variants
  • +7
    Security Information And Event Management (Siem)
  • +9
    Unified Threat Management (Utm)
  • +11
    Access Control
  • +12
    Backup and Recovery
  • +14
    Big Data Governance
  • +13
    Security Intelligence
  • +10
  • +5
    Focus on Product Innovation
  • +14
    Product Features and Functionality
  • +12
    Data in Motion
  • +12
    Type of Channels
  • +7
    Solutions Offered
  • +6
    R&D Spend
  • -11
    Data in Rest
  • -14
    New Product Launches
  • -13
    Product Upgradation
  • -9
    Education and Training
  • -8
    Ability to Expand the Capability
  • -7
    Customer Feedback
  • -14
    No. of Innovations
  • -11
    Product Variants
  • -10
    Other Technology Offered
  • -5
    Others (Big Data Customization and Discovery, and Audit and Reporting)
THALES GROUP Presence in Big Data Security Solutions
Thales e-Security aims to strengthen its presence through deeper market penetration across data security and encryption segments in existing geographies by offering a comprehensive set of security solutions and support services that accelerates RoI. By offering a ready-to-install data security solution for all the infrastructure and providing AGS services, Thales e-security intends to help enterprises prosper by deploying sensible data protection solutions. According to the company, organizations are actively adopting widespread deployment of data encryption solutions due to increased data threats and regulatory compliance. The company has majorly focused on acquisition strategies to attract new customers and in enhancing its product offerings. For instance, the acquisition of Vormetric Inc. would expand the geographic reach of the company and would enhance its product portfolio further improving its overall performance. The company has a strong presence in Europe and has regional headquarters in the US, UK, and China. It operates in these geographies directly and through its distribution and channel partners. In the new and emerging markets, where Thales does not have a direct presence, it works with consulting partners to expand its footprint by deploying increased data security solutions and reduce cost and complexity associated with wide adoption of security solutions. Through its diversified product portfolio and 24x7 support and maintenance services, the company has established itself as a leader in the big data security market.
I agree to 360Quadrants Terms of use and privacy policy


Company Size :