Overview
The CipherTrust Data Security Platform brings together 3 aspects of security to help reduce complexity and risk.
Discover is the ability to go out and inspect data systems, databases and other locations where data is stored to identify sensitive data and help classify that data. Our approach is a solution to look at both structured and unstructured data and provide a risk oriented view to help you understand your risk and determine where to apply data protection.
Protect is our core capability. The suite of encryption and tokenization solutions we offer cover a wide range of different types of data in different platforms. We are able to protect data wherever it resides, and because we offer an integrated platform we are able to centralize the policies and audit reports and the control and management of all of these things in a single place.
Control is the management of keys. Our key management solutions centralize the cryptographic keys used in all of the different types of encryption we support so it can be managed in a consistent way. This provides a lot of assurance to organizations that they have proper control and good governance over their security solutions.
Together, the CipherTrust Data Security Platform is our approach to help you discover, protect and control your sensitive data so you can improve the efficiency of data security administration, consistently apply security policies, and more easily demonstrate compliance.
The CipherTrust Data Security Platform provides a unified approach to help organizations simplify data security across a broad set of use cases, secure their digital transformation, and accelerate their time to compliance. At the foundation of the CipherTrust Data Security Platform is CipherTrust Manager (CM). CM comes in both physical and virtual appliances, and as a service. The value of the platform comes from the integrated solutions that we call Connectors.
Across the CipherTrust Connectors we offer a number of different use cases.
Our data discovery and classification solution allows you to search different repositories (both structured and unstructured) for sensitive data and provides a risk oriented view to help you understand your risk and determine where to apply data protection.
For encryption and tokenization we support a large number of different use cases to apply encryption at the file system level, the database or column level, with libraries embedded into applications, or with API gateways. We offer everything from standard encryption and tokenization to data masking.
For key management we provide the ability to centrally manage the keys that are used across different use cases, along with the ability to backup and archive key material. We offer centralized key management not just within your enterprise, but also in cloud environments with support for all the major cloud providers including AWS native keys, BYOK, and HYOK.
Highlights
- Maintain sovereign control of sensitive data.
- Centrally manage the encryption keys and policies that protect data.
- Robust auditing and reporting.
Details
Typical total price
$6.566/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t2.xlarge Recommended | $6.38 | $0.186 | $6.566 |
t3.xlarge | $6.38 | $0.166 | $6.546 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
Contact us
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
After deploying CipherTrust Manager instance in your AWS region, please follow the steps as described at the following link: https://www.thalesdocs.com/ctp/cm/latest/get_started/deployment/virtual-deployment/aws-deployment/index.html
Support
Vendor support
The Thales Support Portal is an easy-to-use, self-service portal that provides 24x7 access to a wealth of support information and product content via the web. If you do not yet have the Thales Customer Identifier, please register at the link:
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Ease of discovery of data along with it's classification and protection
Filling gaps for the PII data which wasn't classified
Discovery was important phase for us to know what data resides and where.
Capabilities like vaultless tokenization and masking helps us to maintain security of data when encryption isn't feasible and helps us to comply with various standards for data at rest.
Reporting can also be enhanced.
Data discovery and classification
Monitor, detect and control/reporting on data access.
Tokenization is also very important piece.