Your cookie settings

We use cookies. By clicking "Submit Preferences" you are consenting to the use of cookies and understand that you can update your cookie preferences at any time. For more information about which cookies we use and how to change your preferences please visit our Privacy Policy page.

Some cookies are necessary for the usual function of our website. These are destroyed when you close your browser and do not store any of your details. Please note that choosing this option will result in you seeing this message each time you visit a new page as we are not storing any preferences for you.

In order for us to remember the preferences you select today and ensure that you don’t see this message again, we need to store a cookie to remember you. This is the only tracking cookie we will store if you select this option.

By selecting ‘all cookies’, you are consenting to the use of cookies and understand that you can update your cookie preferences at any time. For more information about which cookies we use and how to change your preferences please visit our Privacy Policy page.

Submit Preferences
Background

Vormetric Encryption

Safeguard data everywhere and achieve compliance and access controls.

Vormetric Encryption-as-a-Service can be implemented across a wide range of platforms with minimal disruption and can flex as your business scales and requirements change. With this continuous protection, together with automated maintenance and intelligence capabilities, you can rest assured that your sensitive data is always protected to the correct level.

Is it right for me?

Strong encryption is essential for modern businesses. On top of safeguarding your most important information, it also supports you in achieving compliance with the strictest of industry standards and can help you avoid hefty fines, as well as reputational damage, should you suffer a data breach.

But with data sets ever-growing and infiltrating multiple environments – from the cloud to virtual systems, on-premise and big data platforms – modern encryption needs to be adaptable, low latency and robust.

That’s why we leverage Vormetric encryption from Thales, and offer it as a service. This cost-effective and flexible, advanced solution offers strong encryption alongside strict access controls and audit logging across all environments, regardless of the storage technology you use.

Helping your organisation achieve compliance with data protection mandates by safeguarding data-at-rest. This is done through robust encryption, strict access controls and data access audit logging, whether that be across multiple cloud environments, on-premise or within big data and container environments.

Why choose The Bunker?

Our service only employs strong, standard- based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and Elliptic Curve Cryptography (ECC) for key exchange. The agent is FIPS 140-2 Level 1 validated.

Continuous enforcement of policies protects you against unauthorised access by users and processes, as well as creating detailed data access audit logs of all activities.

Identify and stop threats faster with our detailed data access audit logs that not only satisfy compliance and forensic reporting requirements, but also enable data security analytics with popular Security Information and Event Management (SIEM) systems.

How Vormetric works

Agents are deployed on servers at the file system or volume level, enabling encryption and access control without requiring changes to applications, infrastructure, systems management tasks or business practices.

This service can also alleviate the planned downtime required for initial encryption and scheduled rekeying operations seamlessly by adding the Vormetric Live Data Transformation option to deployments.

This service only employs strong, standard- based encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and Elliptic Eurve Eryptography (ECC) for key exchange. The agent is FIPS 140-2 Level 1 validated.

Continuous enforcement of policies that protect against unauthorised access by users and processes, as well as creating detailed data access audit logs of all activities.

Enforcement of granular, least-privileged user access policies that protect data from external attacks and misuse by privileged users. Specific policies can be applied by users – including administrators with root privileges, other system level users and LDAP/Active Directory users and groups – process, file type, time of day, and other parameters.

Our Accreditations

  • ISO 27001
  • CITRIX Partner
  • First
  • G-Cloud Accredited
  • ITIL Service Management
  • Microsoft Gold Partner
  • NHS IGSoC Approved
  • PCI DSS
  • PRINCE2
  • RIPE NCC Member
  • Tech UK
  • Veeam Gold Cloud & Service Provider Partner