Voltage SecureData for Cloud encrypts data, eliminating the risk of data breaches while leaving data accessible via cloud applications and services. Voltage Format-Preserving Encryption also enables the adoption of a continuous data protection model in multi-cloud environments through removing the need for in-cloud decryption.
Voltage encryption, tokenization, and hashing techniques retain relationships in protected data and the ability to glean insights, while dramatically reducing the risk of data breach or non-compliance with privacy regulations. SecureData integrates with high performance analytic platforms, including Vertica, Teradata, and a wide variety of Hadoop ecosystem technologies.
Voltage SecureData supports the industry’s broadest range of platforms and systems, and provides flexible implementation and encryption for structured data types in any language, any region. Security servers and clients enable applications, data, and data stores to interoperate with end-to-end protection across the data lifecycle.
Privacy regulations such as the CCPA and GDPR recommend encryption and pseudonymization as techniques to protect personal data. Voltage Format-Preserving Encryption (FPE), Format-Preserving Hash (FPH), and Secure Stateless Tokenization (SST) enable enterprises to de-identify sensitive data, but permit continued use of the data in its protected state to drive business value.
Voltage SST enables PCI DSS compliance and maximum PCI audit scope and cost reduction, with proven ease of deployment and management in retail merchant, payment processor, and consumer-facing enterprise environments worldwide. SST is designed to deliver high performance to support geographically diverse data centers, operate efficiently, and scale easily for business growth.
Privacy regulations require businesses to know where their personal data is, control where it flows, and know who is using it. Now Structured Data Manager and Voltage SecureData are integrated so businesses can easily discover and classify sensitive data, enforce centrally-set policy, encrypt or mask data, document actions, and generate reports for compliance audits.