How Vormetric works
Agents are deployed on servers at the file system or volume level, enabling encryption and access control without requiring changes to applications, infrastructure, systems management tasks or business practices.
This service can also alleviate the planned downtime required for initial encryption and scheduled rekeying operations seamlessly by adding the Vormetric Live Data Transformation option to deployments.
This service only employs strong, standard- based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and Elliptic Eurve Eryptography (ECC) for key exchange. The agent is FIPS 140-2 Level 1 validated.
Continuous enforcement of policies that protect against unauthorised access by users and processes, as well as creating detailed data access audit logs of all activities.
Enforcement of granular, least-privileged user access policies that protect data from external attacks and misuse by privileged users. Specific policies can be applied by users – including administrators with root privileges, other system level users and LDAP/Active Directory users and groups – process, file type, time of day, and other parameters.