Enterprise Data Privacy Architecture

Many organisations today believe that they have adequate data protection by implementing perimeter defence using Firewall/AAA/IDS/IPS/Antivirus legacy architecture. Whilst this type of protection is still required, there is strong evidence to suggest that this type of architecture is not sufficient to meet the myriad of threats that confront most organisations today.

Security experts recommend an Enterprise Data Privacy Architecture to complete existing perimeter defence.

Enterprise Data Privacy architecture provides you with the ability to protect in isolation sensitive data fields residing in IT systems such as Web, Application and Database Servers. This architecture ensures all sensitive data in storage is encrypted, and only decrypted when required. The architecture encrypts data as early as possible – for example at Web servers, and provides many benefits including

  • Centralisation of encryption keys
  • Separation of duties
  • Granular protection of sensitive data from such users as DBA’s and Root Users
  • Auditing and logging and consistent cryptographic interface to any type of application such as those commonly used in Web, Application and Database servers
  • The protection of any identified sensitive data from internal rogue employees as well as external hackers. The same solution also enables an organisation to comply with various data privacy standards such as PCI DSS 1.1

Pro-active and security savvy companies know that traditional perimeter defence is best complimented with Enterprise Data Privacy Architecture. Bring your company into the twenty-first century, and contact Randtronics today.

De-perimeterisation

De-perimeterisation is a concept that reinforces the need for data privacy architectures. The idea was first launched by Jericho Forum and believed that while the firewall serves the primary purpose to “protect wires”, the next move should be for the firewall to protect data. More details about this can be found at the Jericho Forum, an international IT security group that is addressing the need of de-perimeterisation within the industry.

Read the following articles

Please click here to find out more about the products that Randtronics provides for enetrprise data privacy (DPM)

What We Offer

Encryption of Files and Folders - Randtronics DPM File



Encryption of Laptops and Desktops - Randtronics DPM File



Encryption of Databases - Randtronics DPM File



Encryption, Masking, Tokenization of Web, Application and Databases - Randtronics DPM Token Manager



Encryption of Metadata in Web, Application and Databases - Randtronics DPM Token Manager



Management of encryption keys - Randtronics DPM Key Manager



Straightforward integration with a HSM - Randtronics DPM Key Manager



Encryption of SAP ERP Systems - Randtronics DPM File and Token Manager



Encryption of Oracle Financials - Randtronics DPM File and Token Manager

footerLogo
Randtronics LLC

303 Twin Dolphin Drive
Suite 600
Redwood City, CA 94065
United States

  • +1 (650) 632 4272
  • +1 (650) 591 9901
Randtronics Pty Limited

S1.1, Level 1, Building A
64 Talavera Road
North Ryde, NSW 2113
Australia

  • +61 2 8873 1999
  • +61 2 9870 8560
  • enquiry@randtronics.com

Randtronics© 2002 - 2018 | Site design by Wolff