voltage-products-securedata-enterprise-icon-white

HPE SecureData

Data-Centric Protection, End-to-End

HPE SecureData provides an end-to-end data-centric approach to enterprise data protection. This unique data-centric approach protects data over its entire lifecycle—from the point at which it’s captured, throughout its movement across the extended enterprise, all without exposing live information to high-risk, high-threat environments.

Next Generation Technologies for the Data-driven Economy

HPE SecureData includes next generation technologies, Hyper Format-Preserving Encryption (FPE), Hyper Secure Stateless Tokenization (SST), HPE Stateless Key Management, and data masking. HPE SecureData “de-identifies” the data, rendering it useless to attackers, while maintaining its usability and referential integrity for data processes, applications and services.

NIST-Standard:  HPE SecureData with Hyper FPE is NIST-standard using FF1 AES Encryption to encrypt virtually unlimited data types. Hyper FPE technology delivers a proven and approved method of protecting data for U.S. federal and other governmental agencies, and global enterprises and European organizations that need to comply with General Data Protection Regulation (GDPR) requirements.

Key Benefits

  • Neutralize costly and brand damaging data breaches
  • Enable compliance to privacy regulations and address GDPR legislation
  • Reduce compliance audit scope, costs and resources

Key Features and Capabilities

FPE

NIST-Standard

Sensitive data is protected with NIST-Standard FF1 AES encryption, pioneered by Hewlett Packard Enterprise.

Unicode

Unicode Latin 1

Provides format and character set preserving encryption for global enterprises in languages such as German, Spanish, French and much more.

compliance

General Data Protection Regulation (GDPR)

Supports the encryption and pseudonymization guidance in the new GDPR legislation for European Union.

Management

Central policy management and control

Encryption, tokenization, and key management policies are controlled centrally, enabling data privacy policy to be centrally defined, enforced, audited and managed for structured and unstructured data protection.

key

Stateless key management

Dynamically derives keys on-the-fly after authorization, thus eliminating the need to store or manage keys and seamlessly integrates with existing identity management and authorization systems to provide policy based access to data.

API

Simple, high performance
native platform APIs covering enterprise and cloud platforms

Enables native platform encryption for efficiency on a broad range of
application servers.

icon-cloud-183x182

Easy to use web services API’s for distributed and cloud environments

High performance Web services interfaces enabling encryption and tokenization for enterprise applications, middleware, cloud broker systems and cloud applications.

Big Data

Support for diverse platforms for enterprise, Big Data, and cloud data security

Enables the consistent and compatible structured and unstructured data protection across Windows, Linux, AIX, Solaris, HP-UX, HPE Vertica, HPE NonStop, Stratus VOS, IBM z/OS, AWS, Azure, popular cloud stacks,
Hadoop and Teradata.

database2

Agnostic of databases

Compatible with Hadoop, Oracle, DB2, MySQL, IDMS, Sybase, Microsoft SQL, Azure SQL and any traditional database.

How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time? With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

Learn More

More Information

HPE SecureData

Read Data Sheet

Streamlining Information Protection through a Data-centric Security Approach

Read White Paper

Mainframe Data Protection

Read Solution Brief

Data De-Identification

Read Use Case

Meeting Data Residency and Compliance Challenges in Global Enterprises

Read White Paper

Data-Centric Security vs. Database-level Security

Read Technical Brief

PCI Compliance and Scope Reduction

Read Use Case

HPE Secure Stateless Tokenization (SST) on HPE NonStop

Read Solution Brief

HPE – BAH Data-Centric Protection: Enabling Business Agility While Protecting Data Assets

Read White Paper

Data Protection and PCI Scope Reduction for Today’s Businesses

Read White Paper

Data Security Protection for HPE Helion

Read Data Sheet

Reputation is Everything –
Protect Your Data, Your Brand

Reputation takes years to build, moments to lose. Controlling borders and layering security isn’t enough to stay off the front page anymore. You need to dramatically change your security strategy. How?

Buy HPE SecureData

HPE-BAH Data Centric Protection White Paper

How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time? With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.