• Vormetric Key Management as a Service
  • Thales e-Security + Vormetric = Better Together
  • Vormetric Live Data Transformation
  • 2016 VORMETRIC DATA THREAT REPORT
  • Securing data-at-rest just got easier and less costly
  • REACH NEW HEIGHTS IN CLOUD SECURITY.
  • 사용자들은 클라우드 파일 공유를 사랑합니다.
  • Now you can hide sensitive data in plain sight
  • Big Data, Big Risk

데이터 시큐리티 솔루션

보메트릭은 데이터 암호화, 키 관리, 액세스 정책, 권한 사용자 컨트롤, 시큐리티 인텔리전스를 통해 물리적, 가상, 클라우드 인프라스트럭처의 데이터를 보호함으로써 업계 규제 의무 및 전세계 각국의 정부 규제요건을 만족시킵니다.

전세계 고객

155 페타바이츠+ 데이터 10억+ 상업용 트랜잭션 22 국가
500,000+ 서버 포춘 30대 기업중 17개 사 1,500+ 고객

Data Security Resource Center

Analyst Reports
  • Analyst Reports
  • Data Security Blog
  • Customer Success
  • Solution Briefs
  • Videos
  • Webcasts
  • White Papers

Analyst Reports

Peak 10 launches encryption as a Servi...

The 451 Take

Managed infrastructure providers can and do help supply their customers with...

DOWNLOAD >>

Gartner Market Guide for Merchant/Acqu...

The tokenization of sensitive data is a key component in the ensuring of payment system security...

DOWNLOAD >>

Data Security Blog

Imagine a world where your coffee maker produces a fresh brew at the break of dawn simply from activating it with your smartphone. Your driverless car directs you to work while you catch up on the morning news. On the way home, your refrigerator n...

As an Emergency Medical Technician and former ER tech, I am amazed by the amount of change that healthcare has undergone. I am not talking about the advances in medicine though that is certainly impressive. I am referring to the intersection of te...

Customer Success

Japanese Hospital Network Leverages...

Japanese Hospital Network Leverages Vormetric To Comply With National Infrastructure Regulations Download The St. Marianna Association is a network of hospitals and a medical school in the...

DOWNLOAD >>

World Famous Japanese Town Implements...

World Famous Japanese Town Implements Vormetric Encryption To Elevate Residents’ Protection Download Located at the center of the nation, the Japanese town of Yamanouchi borders the world...

DOWNLOAD >>

Solution Briefs

Key Management For Salesforce Shiel...

Salesforce Shield Platform Encryption service is a powerful tool to secure and control sensitive fields and attachments through natively integrated data-at-rest encryption. However, to meet many...

DOWNLOAD >>

Dell Storage SC Series & Vormet...

For IT and security teams today, adaptation is a key part of the job. Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms,...

DOWNLOAD >>

Videos

Demo: Vormetric Content Packs on McAfee Enterprise...

View how Vormetric Content Packs work with McAfee ESM to provide an "inside view" feed in order to guard against the insider threat.

VIEW >>

Vormetric Transparent Encryption Demo

Watch this short demo to learn how Vormetric Transparent Encryption makes it easy to deploy file and database encryption with privileged user access controls and security intelligence log collection across all your server...

VIEW >>

Webcasts

Virtualization Unwrapped – How to Scale while Remaining Secure

Date/Time: July 27, 2016, 1PM EST, 10AM PST There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization...

VIEW >>

Big Data Security Unwrapped

Date/Time: June 20, 2016 at 11AM PST, 2PM EST Hadoop Environments are holding and analyzing an incredible and growing amount of data for most organizations. This data represents intellectual property, monetized product, and is increasingly holding...

VIEW >>

White Papers

Hadoop with Vormetric Transparent...

Hadoop has rapidly gained acceptance in the enterprise and is becoming a central repository for all the data in an enterprise. The data is extensively mined and analyzed by several different...

DOWNLOAD >>

Discover How to Efficiently...

The cyber attacks being waged against government agencies continue to get more frequent, fast changing, and evasive. The Department of Homeland Security (DHS) created the Continuous Diagnostics...

DOWNLOAD >>

EXPERT QUOTE

U.S. retailers, are protecting data for the right reasons, and nearly half have a good track record of safeguarding sensitive data. Protecting reputation and brand integrity was the top reason for securing sensitive.

Garrett Bekker
Senior IT Security Analyst
451 Research

GARTNER NEWSLETTER

Enterprise Data Security for Cloud Environments

Market Guide for Tokenization Vendors

Download >>

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental