• DTR 2017
  • Vormetric Docker Encryption
  • Vormetric Live Data Transformation
  • Vormetric Key Management as a Service
  • Thales e-Security + Vormetric = Better Together
  • Securing data-at-rest just got easier and less costly
  • 사용자들은 클라우드 파일 공유를 사랑합니다.
  • Now you can hide sensitive data in plain sight
  • Big Data, Big Risk

데이터 시큐리티 솔루션

보메트릭은 데이터 암호화, 키 관리, 액세스 정책, 권한 사용자 컨트롤, 시큐리티 인텔리전스를 통해 물리적, 가상, 클라우드 인프라스트럭처의 데이터를 보호함으로써 업계 규제 의무 및 전세계 각국의 정부 규제요건을 만족시킵니다.

전세계 고객

155 페타바이츠+ 데이터 10억+ 상업용 트랜잭션 22 국가
500,000+ 서버 포춘 30대 기업중 17개 사 1,500+ 고객

Data Security Resource Center

Analyst Reports
  • Analyst Reports
  • Data Security Blog
  • Customer Success
  • Solution Briefs
  • Videos
  • Webcasts
  • White Papers

Analyst Reports

Quantifying the Cost of a Data Breach...

By Derek E.Brink, CISSP, Vice President and Research Fellow, IT Security and IT GRC



Vormetric Key Management for Software-...

The use of SaaS applications such as a salesforce.com, ServiceNow, Workday, Box, and others has...


Data Security Blog

The Internet of Things (IoT) is growing at an unprecedented rate. In fact, it’s been predicted that, in the next three years, there will be as many as 30.7 billion connected devices. And this number is set to grow even more by 2025 to 75.4 billion...

Organisations around the world are working hard to ensure that they’ll be able to comply with the EU GDPR when it comes into force next May, although many are lagging behind.

To help your business prepare, my last couple of posts have looke...

Customer Success

Kellogg’s Relies on Vormetric for...

Best known for brands such as Frosted Flakes, Rice Krispies, Special K, Cocoa Krispies, Pringles, Pop-Tarts, Cheez-It, Eggos, Kashi, and Nutri-Grain; Battle Creek, Michigan-based Kellogg Company (...


Vormetric Prescribes Performance,...

As one of North America’s premier drug store chains this company handles large amounts of sensitive personal and business-related information.


Solution Briefs

Vormetric Orchestrator

The demands for encryption, a practical solution to modern security threats and compliance mandates, continue to grow. While security teams need to support more deployments, larger implementations...


Vormetric Transparent Encryption Do...

Docker is taking the application development world by storm. However, while Docker is bringing unprecedented benefits to organizations, it also presents new vulnerabilities.



2016 Data Threat Report

The Data Threat Report, a partnership of Vormetric and 451 Research, analyzes survey data from over 1,100 senior security executives around the world. Risks are identified, regional and industry trends are examined and the most...


Demo: Vormetric Content Packs on McAfee Enterprise...

View how Vormetric Content Packs work with McAfee ESM to provide an "inside view" feed in order to guard against the insider threat.



Data Security Compliance with Encryption

Date/Time: April 25, 2017, 11AM PT | 2PM ET With the changing regulatory landscape around data, it’s time to move past the limitations of your legacy infrastructure. Thales e-Security provides a data-centric encryption platform which helps customers...


2017 Data Threats – The Big Disconnect

Date/Time: February 8, 2017 8:00 AM PT Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect. In this webinar And Kicklighter with...


White Papers

Enhanced Protection For Teradata...

As enterprise organizations continue to make increasing use of sensitive business data to gain competitive advantage, data security needs to be a primary consideration at the very beginning of...


How Format-Preserving Encryption...

Fortrex Qualified Security Assessors (QSA) have authored this important white paper to help clarify the PCI DSS position on when and how to use Cryptographic Tokens, Tokens created using Format...



U.S. retailers, are protecting data for the right reasons, and nearly half have a good track record of safeguarding sensitive data. Protecting reputation and brand integrity was the top reason for securing sensitive.

Garrett Bekker
Senior IT Security Analyst
451 Research



In today’s competitive environment, enterprises earn their customers’ trust every day.

Download >>

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental