Header-Banner

DataSecure

The Foundation for Data Encryption and Control Solutions

DataSecure

SafeNet DataSecure appliances are the heart of all SafeNet data encryption and control solutions . Using hardware-based encryption, DataSecure appliances cover the broadest variety of data types. They provide a unified platform with data encryption and granular access control capabilities that can be applied to databases, applications, mainframe environments, and individual files. By providing centralized management of keys, policies, and essential functions, DataSecure simplifies administration, helps ensure compliance, and maximizes security.

Key Management

With DataSecure, all cryptographic keys are kept in the centralized, hardened appliance to simplify administration while helping ensure tight security for the broadest array of data types. Key versioning streamlines the time-consuming task of key rotation

Policy Management

Administrators can set authentication  and authorization policies that dictate which application, database, or file servers can be accessed by particular users in the clear. When combined with strong authentication, this policy-driven security provides a vital layer of protection. DataSecure also offers granular access controls to help you comply with the separation of duties required in many security mandates. An administrator can create a policy that prevents certain users from accessing sensitive data without interfering with their day-to-day system administration duties.

Logging, Auditing, and Reporting

When encrypting data within an enterprise, data, keys, and logs are often accessed, encrypted, managed, and generated on multiple devices, in multiple locations. To reduce the cost and complexity of security management, DataSecure provides a single, centralized interface for logging, auditing, and reporting access to data and keys. A centralized mechanism increases security and helps you ensure compliance with industry mandates and government regulations.

View Especificações Resource Library

Performance

  • Processes more than 100,000 encryptions per second
  • Scalable to hundreds of thousands of encryptions per second via clustering of multiple DataSecure platforms
  • Less than 100 microseconds latency

Security Algorithms

  • AES, 3DES, DES, RSA (signatures and encryption), RC4, HMAC SHA-I – SHA512, SEED

Asymmetric Key Sizes

  • 512, 1024, 2048

Symmetric Key Sizes

  • 40, 56, 128, 168, 192, 256

Certificate Management

  • Multiple certificates, built-in certificate authority, manage certificate requests, certificate revocation list (CRL) support

API Support

  • .NET, MSCAPI, JCE, ICAPI, PKCS#11

Network Management

  • SNMP (v1, v2, and v3), NTP, URL health check, signed secure logs, syslog, automatic log rotation, secure encrypted and integrity checked backups and upgrades, extensive statistics

System Administration

  • Secure Web-based GUI, secure shell (SSH), console

Web and Application Servers Supported

  • Oracle, IBM, BEA, IIS, Apache, Sun ONE, JBoss, and more

Databases Supported

  • Oracle, Microsoft SQL Server, IBM DB2, Teradata

Mainframes Supported

  • IBM z/OS

File Servers Supported

  • Microsoft, Red Hat Linux, Cent0S Linux
View Recursos e vantagens Resource Library

Features:

  • Comprehensive data protection—Achieve comprehensive data protection with granular encryption capabilities that can be integrated at the database, application, drive, folder, or file level.
  • Centralized management—Simplify security administration, ensure regulatory compliance, and maximize overall security with centralized management of cryptographic keys and policies as well as logging, auditing, and reporting functions.
  • Multiple Credentials – establishes a separation of duties to prevent any one administrator from making critical configuration changes without additional approvals of other administrators.
  • Deployment options—Select an appliance to address entry-level needs or accommodate the highest level of cryptographic processing.

Benefits:

  • Growth enabled—Pursue new business opportunities and forge new partnerships with the confidence that your critical information is persistently protected.
  • Data ownership defined—Maintain ownership of data throughout its lifecycle, wherever it resides.
  • Productivity empowered—Encrypt information transparently, without disrupting business operations, computing performance, or the end-user experience.
View Visão geral Resource Library
CTA Software vs Hardware WP DEC