Singapore – Thales, a technology and security firm, has recently introduced its latest CipherTrust Transparent Encryption (CTE) through the CipherTrust Data Security Platform as a service.
As a new solution, CTE is designed to provide transparent, high-performance encryption for complex environments without the need to modify applications or underlying infrastructure.
It further assists customers in addressing compliance and best practice requirements for protecting data across multiple clouds, on-premises, and container environments.
In addition, this initiative also provides live data transformation with a zero-downtime encryption deployment feature that encrypts and re-keys data without taking applications offline. Said feature offers the ultimate promise of transparency by not requiring any modification of the application or infrastructure.
Another essential feature is its ransomware protection that constantly monitors processes for abnormal I/O activity and alerts or blocks malicious activity before ransomware can take hold of your endpoints and servers.
Todd Moore, vice president of data security products at Thales, said, “With this new CipherTrust Data Security Platform capability, Thales offers customers an option to deploy and consume data security services in a variety of different ways to effectively future-proof their data across multiple systems and environments.”
“Organisations can enjoy seamless updates free of disruption, scale to meet business demands, close the skills gap for security expertise, and deploy data security more quickly and cost-effectively without the need to invest in additional hardware and software,” he further explained.
The introduction of CipherTrust Transparent Encryption via the CipherTrust Data Security Platform as a Service builds on the success of CipherTrust Cloud Key Management (CCKM) as a Service, offering enterprises centralised control to secure and manage encryption keys across public cloud and SaaS environments.
This solution makes it easy for IT security teams to consume, deploy, and manage encryption and key management while lowering the cost of ownership, reducing deployment time, and helping enterprises address the growing shortage of skilled IT staff.