Voltage SecureData Enterprise
Complete Protection of PII, PHI, and PCI Data for Enterprises Handling Sensitive Information
Financial institutions, merchants, health care providers, and service providers share common concerns when it comes to data protection and privacy. Paramount is the increasing number of threats to sensitive information and compliance with the many stringent industry and government regulations.
Voltage SecureData Enterprise provides a comprehensive approach to enterprise data protection. It includes market-leading Voltage Format-Preserving Encryption, Voltage Secure Stateless Tokenization technology, Voltage Stateless Key Management, and data masking to address the entire lifecycle of sensitive data as it moves through the enterprise and beyond. It also extends data protection beyond organizational borders, enabling protection of data shared with partners, suppliers, and outsourcers.
Voltage SecureData Enterprise is the only comprehensive data protection framework that secures data as it is captured, processed, and stored across a variety of devices, operating systems, databases, and applications used by enterprises, merchants, and service providers.
Voltage SecureMail delivers:
Key Features and Capabilities:
- Centralized, scalable and simple key management
Voltage SecureData Enterprise allows customers to easily extend their data protection to the application level while eliminating the operational barriers traditionally associated with key management.
- Significantly lower implementation and management costs
Voltage SecureData Enterprise can be deployed with no impact on database schemas and minimal changes to applications. Its robust, policy-driven approach to data protection helps ensure that users only see the information they require or as determined by business policy.
- Rapid, continuous compliance
Voltage SecureData Enterprise supports compliance with the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), and state and national privacy regulations by reducing the scope of PCI audits, supporting best practices for key management and helping to demonstrate compliance via built-in reporting and logging capabilities.
- Single management console
Enforces data access and key management policies and centralizes the process of defining policies so organizations do not have to configure each application individually.
- Stateless key management server
Dynamically derives keys, thus eliminating the need to store or manage keys and seamlessly integrates with existing identity management and authorization systems.
- Centralized web services
Centralizes web services to enable encryption and tokenization services for enterprise applications and middleware.
- Simple APIs
Enables native platform encryption for efficiency on a broad range of application servers.
- Support for multiple platforms
Supports a broad range of systems, including Windows, Linux, AIX, Solaris, HP-UX, HP NonStop, Stratus VOS, IBM z/OS, and Teradata.