Thales // Database Encryption

One of the technical measures required for database security under KVKK (Turkish Data Protection Law) is the implementation of encryption and masking, which are among the most important measures.

  • Database Level [encryption and masking]
  • Access Level [access control lists and permissions]
  • Perimeter Level [Firewalls and Virtual Private Networks]

Database encryption is used to encrypt readable data in databases, making it unreadable to anyone without the appropriate authorization and encryption key. Thales provides the most comprehensive security solutions as a database encryption solution.

LEARN MORE

The features of Thales solution are as follows:

CipherTrust Manager: Enables organizations to centrally manage encryption tools, provide granular access control, and configure security policies. CipherTrust Manager serves as the central management point for the CipherTrust data security platform.

CipherTrust Database Protection (CDP): Provides transparent encryption of sensitive data at the column level in databases, such as credit card numbers, social security numbers, national identification numbers, passwords, and email addresses. Its high-performance architecture helps identify where encryption should take place, tailored to your requirements and infrastructure.

CipherTrust Application Data Protection: Supports the evolving needs of DevOps and DevSecOps by facilitating the secure integration of rapidly growing software. It brings together secure key generation and storage to support developers, processes, and security throughout the environment. Only authorized users can access application data.

CipherTrust Transparent Encryption: Provides encryption for data at rest with central key management, privileged user access control, and detailed data access audit. It protects such data anywhere within the company, across multiple clouds, storage areas, or container environments. Designed to meet requirements with minimal interruption, effort, and cost.

CipherTrust Tokenization: Simplifies the protection of sensitive data, including personally identifiable information, while reducing costs and efforts to comply with security policies and regulations such as KVKK and PCI-DSS.