What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close


Detailed Mapping of Vormetric Data Security Platform Controls to NIST 800-53 Requirements

Aug 21, 2014

Critical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform. Learn how to deliver on critical data protection controls.

  • Encryption and Key Management - strong, centrally managed, file and volume encryption combined with simple, centralized key management that is transparent to processes, applications and users.

  • Access Policies and Privileged User Controls - that restrict access to encrypted data – permitting data to be decrypted only for authorized users and applications, while allowing privileged users to perform IT operations without ability to see protected information.

  • Security Intelligence - logs that capture access attempts to protected data, providing high value security intelligence information that can be used with a Security Information and Event Management (SIEM) solution and for compliance reporting.