Your enterprise applications access some of your most sensitive information—from credit card information and e-mail addresses to employee data, health records and national IDs. That information is often in motion. It is processed, manipulated, and modified by Web-based software as well as the business applications that handle customer relationship management (CRM), human capital management (HCM), and enterprise resource planning (ERP). You need a robust solution that can protect information from attacks, theft, and a range of malicious threats throughout its lifecycle, all without affecting application performance.
SafeNet ProtectApp provides policy-driven access, centralized management, and efficient encryption for sensitive, structured data stored in the application layer.
ProtectAppSafeNet ProtectApp offers the highest level of application security available in a commercial encryption solution for business applications.
Protect sensitive, strucutred data across data center applications.
SafeNet ProtectApp offers the highest level of application security available in a commercial encryption solution for business applications like customer relationship management (CRM), enterprise resource planning (ERP), and human capital management (HCM). With ProtectApp, you can achieve persistent protection of information by combining proven encryption algorithms with granular, policy-based security. Data is secured transparently, without affecting application performance or the user experience. Centralized key and policy management provided with the integrated SafeNet DataSecure appliance enables administrators to support a large number of applications.
ProtectApp and DataSecure provide granular, policy-driven security to ensure that only authorized, authenticated users and systems can interact with sensitive application data. Administrators can set policies defining which data types are protected, which applications can see and interact with data in the clear, and more. Policies can be defined by user, by role, by time-of-day, by data type, providing better control.
By centralizing key and policy management, ProtectApp and DataSecure simplify administration and tighten security. Reducing the number of places where keys reside also dramatically reduces the potential threats to application security. At the same time, ProtectApp gives you the choice to either offloading cryptographic functions to DataSecure or encrypt locally which helps to ensure that application performance does not suffer as a result of security processes. With ProtectApp and DataSecure, you can support a large number of applications across your enterprise.
To move large amounts of sensitive data in and out of data stores rapidly, administrators can capitalize on the DataSecure’s ability to do the encryption and decryption of specific fields in bulk within the flat files that can contain millions of records. By focusing on select fields, you can encrypt and decrypt data efficiently, in a fraction of the time that it might take for the entire file. DataSecure also can be used to encrypt the entire binary files when you do not need field-level granularity.
Your applications are at the core of your business. They enable you to provide services, collaborate with partners, and facilitate employee productivity. With ProtectApp, you can make sure the data created, accessed, and modified by applications remains secure at all times, so you can stay focused on using information to achieve your business goals.
|Web and Application Servers Supported||Oracle, IBM, BEA, IIS, Apache, Sun ONE, JBoss, SAP, and more|
|Encryption Algorithms||3DES, DES, AES,RSA (signatures and encryption), RC4, SHA-I, SHA-2|
|Supported Platforms||Microsoft Windows, Linux, and IBM z/OS|
Features & Benefits
Granular protection—Retain ownership of data throughout its lifecycle with granular policies that define who can access what data at what time of day.
Centralized administration—Simplify security administration and control costs with centralized management of keys, policies, and configurations.
Proven algorithms—Achieve the highest level of application security by using proven cryptographic algorithms combined with strong identity and access policy protection.
Tailored solution—Protect customized applications without having to spend time and money with software development.
Secured collaboration—Collaborate with business partners and integrate new vendors into the digital supply chain knowing that only authorized, authenticated users can view sensitive data.
Increased productivity—Encrypt information transparently, without disrupting business operations, application performance, or the end-user experience.