Listing Thumbnail

    CipherTrust Data Security Platform

     Info
    Sold by: Thales 
    Thales CipherTrust Data Security Platform centrally manages the keys and policies that protect data. Thales advanced encryption and centralized key management solutions give you protection and control of data stored on your premises, Amazon Web Services, and other cloud providers.
    Listing Thumbnail

    CipherTrust Data Security Platform

     Info
    Sold by: Thales 

    Overview

    The CipherTrust Data Security Platform brings together 3 aspects of security to help reduce complexity and risk.

    Discover is the ability to go out and inspect data systems, databases and other locations where data is stored to identify sensitive data and help classify that data. Our approach is a solution to look at both structured and unstructured data and provide a risk oriented view to help you understand your risk and determine where to apply data protection.

    Protect is our core capability. The suite of encryption and tokenization solutions we offer cover a wide range of different types of data in different platforms. We are able to protect data wherever it resides, and because we offer an integrated platform we are able to centralize the policies and audit reports and the control and management of all of these things in a single place.

    Control is the management of keys. Our key management solutions centralize the cryptographic keys used in all of the different types of encryption we support so it can be managed in a consistent way. This provides a lot of assurance to organizations that they have proper control and good governance over their security solutions.

    Together, the CipherTrust Data Security Platform is our approach to help you discover, protect and control your sensitive data so you can improve the efficiency of data security administration, consistently apply security policies, and more easily demonstrate compliance.

    The CipherTrust Data Security Platform provides a unified approach to help organizations simplify data security across a broad set of use cases, secure their digital transformation, and accelerate their time to compliance. At the foundation of the CipherTrust Data Security Platform is CipherTrust Manager (CM). CM comes in both physical and virtual appliances, and as a service. The value of the platform comes from the integrated solutions that we call Connectors.

    Across the CipherTrust Connectors we offer a number of different use cases.

    Our data discovery and classification solution allows you to search different repositories (both structured and unstructured) for sensitive data and provides a risk oriented view to help you understand your risk and determine where to apply data protection.

    For encryption and tokenization we support a large number of different use cases to apply encryption at the file system level, the database or column level, with libraries embedded into applications, or with API gateways. We offer everything from standard encryption and tokenization to data masking.

    For key management we provide the ability to centrally manage the keys that are used across different use cases, along with the ability to backup and archive key material. We offer centralized key management not just within your enterprise, but also in cloud environments with support for all the major cloud providers including AWS native keys, BYOK, and HYOK.

    Highlights

    • Maintain sovereign control of sensitive data.
    • Centrally manage the encryption keys and policies that protect data.
    • Robust auditing and reporting.

    Details

    Sold by

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu 18.04

    Typical total price

    This estimate is based on use of the seller's recommended configuration (t2.xlarge) in the US East (N. Virginia) Region. View pricing details

    $6.566/hour

    Pricing

    CipherTrust Data Security Platform

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covering your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (2)

     Info
    Instance type
    Product cost/hour
    EC2 cost/hour
    Total/hour
    t2.xlarge
    Recommended
    $6.38
    $0.186
    $6.566
    t3.xlarge
    $6.38
    $0.166
    $6.546

    Additional AWS infrastructure costs

    Type
    Cost
    EBS General Purpose SSD (gp2) volumes
    $0.10/per GB/month of provisioned storage

    Vendor refund policy

    Contact us

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    After deploying CipherTrust Manager instance in your AWS region, please follow the steps as described at the following link: https://www.thalesdocs.com/ctp/cm/latest/get_started/deployment/virtual-deployment/aws-deployment/index.html 

    Support

    Vendor support

    The Thales Support Portal is an easy-to-use, self-service portal that provides 24x7 access to a wealth of support information and product content via the web. If you do not yet have the Thales Customer Identifier, please register at the link:

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    4 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Kapil K.

    Ease of discovery of data along with it's classification and protection

    Reviewed on Oct 07, 2022
    Review provided by G2
    What do you like best about the product?
    Visibility of the sensitive data
    Filling gaps for the PII data which wasn't classified
    Discovery was important phase for us to know what data resides and where.
    Capabilities like vaultless tokenization and masking helps us to maintain security of data when encryption isn't feasible and helps us to comply with various standards for data at rest.
    What do you dislike about the product?
    Many enhancement is feasible in centralized data management.
    Reporting can also be enhanced.
    What problems is the product solving and how is that benefiting you?
    Meeting complaince and standards
    Data discovery and classification
    Monitor, detect and control/reporting on data access.
    Tokenization is also very important piece.
    Emre .

    Thales

    Reviewed on Aug 16, 2022
    Review provided by G2
    What do you like best about the product?
    When it comes to data security, thales has a very wide spectrum. It provides you with end-to-end data security.
    What do you dislike about the product?
    kb solutions are a bit limited. You can usually solve problems by opening a case.
    What problems is the product solving and how is that benefiting you?
    I met my DB and Application security needs with the CTM product.
    Information Technology and Services

    Data security solutions by Thales

    Reviewed on Jul 19, 2022
    Review provided by G2
    What do you like best about the product?
    It eases the data security with improved compliance time and it also protects cloud migration. What more do you expect from Thales ?
    What do you dislike about the product?
    Lot of features and control options makes it bit bulky to operate.. but that's all due to this demanding industry.. can't complaint
    What problems is the product solving and how is that benefiting you?
    Data security operations - protection, discovery and control
    Government Administration

    I feel safe using this program for viral protection

    Reviewed on May 28, 2019
    Review provided by G2
    What do you like best about the product?
    confidence and knowing I can do my job safely
    What do you dislike about the product?
    I dont have control of program to adjust to my liking. Central point of service, not privy to
    What problems is the product solving and how is that benefiting you?
    Where I work, we never know what the cyber net holds. so being able to research the needed information on Universities and faculty, I know I am secure
    Recommendations to others considering the product:
    Works for me
    View all reviews