Securing data-at-rest for Docker environments

Extends Vormetric Transparent Encryption controls for data encryption, access control and data access logging to data inside of, or accessible from, Docker containers

Docker Encryption Extension

Docker is bringing unprecedented benefits to organizations, but this technology also comes with new risks. Vormetric Transparent Encryption Docker Extension delivers critical encryption, access controls, and logging capabilities that enable organizations to meet compliance, regulatory, and best practice requirements for safeguarding data within dynamic Docker environments.

Vormetric Container Security
Prevent Privileged User Abuse

Docker runs with root level systems permissions, resulting in Docker administrators having full access to Docker and system data. Encryption with data access controls enables privileged users such as Docker administrators to work as usual, without exposing sensitive information.

Maximize Container Advantages, Minimize Risk

Enforce data security policies in dynamic Docker environments, even in the cloud. Maximize the benefits of using Docker in any environment, without compromising data security.

Address Compliance Requirements

Address the data access control requirements of pertinent compliance and other regulatory mandates—whether you manage payment cards, healthcare records, or other sensitive assets.

Comprehensive Data Security Safeguards

Extends Vormetric Transparent Encryption, enabling security teams to establish data security controls inside of Docker containers. With this extension, you can apply encryption, access control, and data access logging on a per-container basis. Encryption can be applied to data generated and stored locally within the container and to data mounted in the container by network file systems.

Granular Controls and Visibility

Vormetric Container Security offers the detailed visibility and control you need to comply with the most stringent policies and mandates. With this solution, enterprises can establish granular access policies based on specific users, processes, and resource sets within containers. Finally, this solution can establish isolation between containers, so that only authorized containers can access sensitive information.

No changes to Docker containers or environments

Establish data security controls without having to make any changes to applications, containers or infrastructure sets. The solution even supports common Docker microservices deployment models, enabling single policies that can apply to all containers running on a Docker instance, allowing distinct policies for each container or a mix of policy types.

Requires Vormetric Transparent Encryption as a prerequisite

Platform/Environment Support

  • Red Hat Enterprise Linux, 7.x
  • Can run on physical systems, VMs, and AWS EC2 instances
  • All other support specifications identical to Vormetric Transparent Encryption

Demo : Vormetric Transparent Encryption

Watch this short demo to learn how Vormetric Transparent Encryption makes it easy to deploy file and database encryption with privileged user access controls and security intelligence log collection across all your server environments (physical, virtual, big data and cloud) with centralized policy and key management. This demo includes an animated demonstration, policy configuration, insider abuse demonstration, and review of the actual audit logs produced.

Play

White Paper : Vormetric Transparent Encryption Architecture

Today’s IT and security organizations need to continue to scale their capabilities. They need to employ safeguards around larger volumes of sensitive data. They have to guard against more persistent and sophisticated threats, and they must establish these safeguards in more places. To address these expanding requirements, leading enterprises and government agencies rely on Vormetric Transparent Encryption.

Download

Solution Brief : Vormetric Transparent Encryption Docker Extension

Vormetric Transparent Encryption Docker Extension delivers critical encryption, access controls, and logging capabilities—so you can meet compliance, regulatory, and best practice requirements for safeguarding data within dynamic Docker environments.

Download
Посмотрите интерактивное демо Подробнее
Записаться на демо Записаться
Свяжитесь со специалистом Свяжитесь с нами