Protegrity offers enterprise data protection platform

Protegrity today announced the release of the Protegrity Data Protection System (DPS) 5. DPS 5 offers enterprises proactive risk-adjusted data security strategies that balance business needs and security/compliance demands. As complete enterprise data protection platform Protegrity DPS 5 secures data at the application, file and database levels according to an enterprise’s own security policies. Protegrity’s central key manager ought to manage encryption key lifecycles across all protection points, across platforms, enterprise wide.

DPS 5 is comprised of three core components: Protegrity Threat Management System is a web application firewall that detects and blocks unwanted activity. Protegrity Enterprise Security Administrator delivers security alerting, reporting, and auditing across the enterprise. Protegrity Data Protection System provides encryption, masking, monitoring, tokenization, and hashing for applications, databases, and files.

  • Tokenization: Removes critical data from the information stream, associates it with a reference token and moves it to a secure location. The token allows the secured data to be retrieved by authorized users. This method is suited for securely retaining high risk data like credit card information and social security numbers.
  • Format Controlling Encryption: Retains the original format – on a character-by-character basis – of encrypted data, putting an end to data re-formatting and database schema changes. FCE protects data and enables it to be easily integrated into legacy systems, across mixed platforms and allows sensitive information to be safely used in testing/virtual servers and other less-controlled environments.
  • Data Usage Monitoring: Allows an enterprise to monitor selected lower-risk data to understand how and by whom it is being used. DUM can be used as an easy-to-deploy, first step in the roll out of a comprehensive data security strategy and helps enterprises to build targeted, highly effective access control policies.
  • Policy-Based Masking: Provides the ability to mask selected parts of a sensitive asset. An enterprise’s security policies determine whether a recipient should receive specific information in clear text or partially obscured, giving security officers highly granular control over how users can view sensitive assets. Implemented at the database rather than application level, PBM provides a consistent level of security across the enterprise.
  • Security Coordinates: Provides critical forensic and compliance auditing information, delivering a highly-granular auditing tool that identifies the specific source of an audit event, including IP address, port, database, table, column, and row identifier along with exactly what activity occurred, across an entire system or a single server.

(Source: Protegrity Corporation/GST)

Matomo