Protegrity released the Protegrity Data Protection System (DPS) 5. It enables enterprises to select, deploy and easily manage a unified set of technologies that best meet their specific security requirements and business needs.
New and enhanced features in DPS 5
Tokenization: removes critical data from the information stream, where it is a prime target for malicious hackers, associates it with a reference token and then moves the data to a highly secure location. The token allows the secured data to be retrieved by authorized users. This practical protection method is perfectly suited for securely retaining high risk data like credit card information and social security numbers. The Protegrity Token Server solution enables enterprises to centrally manage tokenization across the enterprise and its applications, databases and files.
Format controlling encryption: retains the original format, on a character-by-character basis, of encrypted data, putting an end to the data re-formatting and database schema changes required by other encryption techniques. FCE protects data and enables it to be easily integrated into legacy systems, across mixed platforms and allows sensitive information to be safely used in testing/virtual servers and other less-controlled environments.
Data usage monitoring: allows an enterprise to monitor selected lower-risk data in order to understand exactly how it is being used and who is accessing it. Data Usage Monitoring can also be used as an easy-to-deploy, effective first step in the roll out of a comprehensive data security strategy and helps enterprises that are refining their security processes to build targeted, highly effective access control policies.
Policy-based masking: provides the ability to mask selected parts of a sensitive asset. An enterprise’s security policies determine whether a recipient should receive specific information in clear text or partially obscured, giving security officers highly granular control over how users can view sensitive assets. Implemented at the database level rather than application level, policy-based Data Masking provides a consistent level of security across the enterprise without interfering with business operations and greatly simplifies data security management chores.
Security coordinates: provides critical forensic and compliance auditing information, delivering a highly-granular auditing tool that identifies the specific source of an audit event, including IP address, port, database, table, column, and row identifier along with exactly what activity occurred, across an entire system or a single server.
“DPS is a truly significant update. We have incorporated many Protegrity-patented technologies into this release,” said Paul Giardina, CEO of Protegrity. “We, along with many enterprises, believe that risk-adjusted data protection is the most effective security model to employ, and DPS 5 strongly demonstrates our commitment to supporting practical, business-process based data security solutions.”
Protegrity Data Protection System 5 secures data at the application, file and database levels, driven by an enterprise’s own security policies. Protegrity’s central key manager manages encryption key lifecycles across all protection points, across platforms, enterprise wide.