Tekno A
  • Home
  • About
  • Solutions
    • Enterprise Security
    • Data Security
    • Identity&Access Management
    • Payment Security
    • Software Development
    • IoT
  • Products
    • Enterprise Security Products >
      • Thales HSM - Multi Purpose
      • Thales HSM - Payment Systems
      • Vormetric
      • Utimaco HSM - Security Server
    • Enterprise Network Products >
      • Meinberg - NTP Time Server
      • Meinberg - GPS Antennas & Distributers
  • Services
  • Career
    • Students
    • Professionals
  • Contact
  • Home
  • About
  • Solutions
    • Enterprise Security
    • Data Security
    • Identity&Access Management
    • Payment Security
    • Software Development
    • IoT
  • Products
    • Enterprise Security Products >
      • Thales HSM - Multi Purpose
      • Thales HSM - Payment Systems
      • Vormetric
      • Utimaco HSM - Security Server
    • Enterprise Network Products >
      • Meinberg - NTP Time Server
      • Meinberg - GPS Antennas & Distributers
  • Services
  • Career
    • Students
    • Professionals
  • Contact

Vormetric Container Güvenliği

Extends Vormetric Transparent Encryption controls for data encryption, access control and data access logging to data inside of, or accessible from, Docker containers
Tekno A Teknoloji > Ürünler > Veri Güvenliği > Vormetric Container Güvenliği

Securing data-at-rest for Docker environments

Docker is bringing unprecedented benefits to organizations, but this technology also comes with new risks. Vormetric Transparent Encryption Docker Extension delivers critical encryption, access controls, and logging capabilities that enable organizations to meet compliance, regulatory, and best practice requirements for safeguarding data within dynamic Docker environments.
Picture
  • Yararlar
  • Özellikler ve Teknik Detaylar
<
>

Prevent Privileged User Abuse


Docker runs with root level systems permissions, resulting in Docker administrators having full access to Docker and system data. Encryption with data access controls enables privileged users such as Docker administrators to work as usual, without exposing sensitive information.

Maximize Container Advantages, Minimize Risk


Enforce data security policies in dynamic Docker environments, even in the cloud. Maximize the benefits of using Docker in any environment, without compromising data security.

Address Compliance Requirements


Address the data access control requirements of pertinent compliance and other regulatory mandates—whether you manage payment cards, healthcare records, or other sensitive assets.
Comprehensive Data Security SafeguardsExtends Vormetric Transparent Encryption, enabling security teams to establish data security controls inside of Docker containers. With this extension, you can apply encryption, access control, and data access logging on a per-container basis. Encryption can be applied to data generated and stored locally within the container and to data mounted in the container by network file systems.

Granular Controls and VisibilityVormetric Container Security offers the detailed visibility and control you need to comply with the most stringent policies and mandates. With this solution, enterprises can establish granular access policies based on specific users, processes, and resource sets within containers. Finally, this solution can establish isolation between containers, so that only authorized containers can access sensitive information.

No changes to Docker containers or environmentsEstablish data security controls without having to make any changes to applications, containers or infrastructure sets. The solution even supports common Docker microservices deployment models, enabling single policies that can apply to all containers running on a Docker instance, allowing distinct policies for each container or a mix of policy types.


Requires Vormetric Transparent Encryption as a prerequisite

Platform/Environment Support
  • Red Hat Enterprise Linux, 7.x
  • Can run on physical systems, VMs, and AWS EC2 instances
  • All other support specifications identical to Vormetric Transparent Encryption

Benzer Ürünler

VORMETRIC ANAHTAR YÖNETİMİ

Şifreleme anahtarlarını ve sertifikaların depolanmasının güvenliğini merkezi bir yönetimle kolaylaştırır.

VORMETRIC TRANSPARAN ŞİFRELEME

Dosyalar, dizinler ve hacimler için yüksek performanslı şifreleme ve en az ayrıcalıklı erişim denetimi sağlar

VORMETRIC AKILLI GÜVENLİK

Root kullanıcı erişimi de dahil olmak üzere dosya erişimi faaliyetlerinin denetlenebilir şekilde kaydını tutar
​

Picture
+90 (216) 352 1370
​info@teknoa.com.tr

PRODUCTS

SOLUTIONS

CAREER
​

CONTACT

©  Copyright 2017 TeknoA.  ALL RIGHTS RESERVED.