HPE SecureData

Data-Centric Protection, End-to-End

HPE SecureData provides an end-to-end data-centric approach to enterprise data protection. This unique data-centric approach protects data over its entire lifecycle—from the point at which it’s captured, throughout its movement across the extended enterprise, all without exposing live information to high-risk, high-threat environments.

Next Generation Technologies for the Data-driven Economy

HPE SecureData includes next generation technologies, Hyper Format-Preserving Encryption (FPE), Hyper Secure Stateless Tokenization (SST), HPE Stateless Key Management, and data masking. HPE SecureData “de-identifies” the data, rendering it useless to attackers, while maintaining its usability and referential integrity for data processes, applications and services.

FIPS and NIST validated: HPE SecureData with Hyper FPE is FIPS 140-2 validated, leveraging the NIST FF1 AES encryption standard to encrypt virtually unlimited data types. Hyper FPE technology delivers a proven and approved method of protecting data for U.S. federal and other governmental agencies, and global enterprises and European organizations that need to comply with General Data Protection Regulation (GDPR) requirements.

Integrated HSM: The integration of HPE SecureData with HPE Atalla HSM offers organizations physical and logical data protection, FIPS validated hardware solution for storing and managing keys, and centralized configuration and security policy enforcement, making it simpler for customers to manage data protection

Key Benefits

  • Neutralize costly and brand damaging data breaches
  • Enable compliance to privacy regulations and address GDPR legislation
  • Reduce compliance audit scope, costs and resources
  • Secure, root of trust to store your most sensitive secrets

Key Features and Capabilities


Sensitive data is protected with NIST-Standard FF1 AES encryption, pioneered by Hewlett Packard Enterprise.

Unicode Latin 1

Provides format and character set preserving encryption for global enterprises in languages such as German, Spanish, French and much more.

General Data Protection Regulation (GDPR)

Supports the encryption and pseudonymization guidance in the new GDPR legislation for European Union.

Central policy management and control

Encryption, tokenization, and key management policies are controlled centrally, enabling data privacy policy to be centrally defined, enforced, audited and managed for structured and unstructured data protection.

Stateless key management

Dynamically derives keys on-the-fly after authorization, thus eliminating the need to store or manage keys and seamlessly integrates with existing identity management and authorization systems to provide policy based access to data.

Simple, high performance
native platform APIs covering enterprise and cloud platforms

Enables native platform encryption for efficiency on a broad range of
application servers.

Easy to use web services API’s for distributed and cloud environments

High performance Web services interfaces enabling encryption and tokenization for enterprise applications, middleware, cloud broker systems and cloud applications.

Support for diverse platforms for enterprise, Big Data, and cloud data security

Enables the consistent and compatible structured and unstructured data protection across Windows, Linux, AIX, Solaris, HP-UX, HPE Vertica, HPE NonStop, Stratus VOS, IBM z/OS, AWS, Azure, popular cloud stacks,
Hadoop and Teradata.

Agnostic of databases

Compatible with Hadoop, Oracle, DB2, MySQL, IDMS, Sybase, Microsoft SQL, Azure SQL and any traditional database.

HPE SecureData and HPE Atalla HSM Integration

Extends end-to-end data protection through the combined, integrated solutions of HPE SecureData Payments and HPE Atalla Hardware Security Module (HSM). By joining data-centric data protection with a tamper-reactive hardware security module, companies are able to neutralize data breaches by protecting data while storing the master secret in a hardened storage device, rendering it useless to attackers.

GDPR is the biggest shake-up in European data protection legislation for 30 years. The GDPR will have global impact and potentially significant consequences to any business that deals with European citizens’ data. Organizations have less than two years to ensure that their data protection processes are compliant. Most organizations will struggle to meet the May 25, 2018 deadline.

Discover how you can turn the General Data Protection Regulation into an opportunity for your business. Join Duncan Brown, Research Director, European Security Practice, at IDC and Tim Grieveson, Chief Cyber Security Strategist, Enterprise Security Products at HPE in this this new webinar titled, “GDPR: make compliance good for your business.”



Learn More

More Information

Gartner Market Guide for Data Masking

Read Market Guide

Mitigate Security Risks and Embrace the Cloud

Read White Paper

Securing traveler data helps revenues take off

Read Use Case

HPE SecureData and HPE Atalla HSM Integration

Read Data Sheet

HPE SecureData

Read Data Sheet

Streamlining Information Protection with Data-centric Security

Read White Paper

Mainframe Data Protection

Read Solution Brief

Data De-Identification

Read Use Case

Meeting Data Residency and Compliance Challenges in Global Enterprises

Read White Paper

Data-Centric Security vs. Database-level Security

Read Technical Brief

PCI Compliance and Scope Reduction

Read Use Case

HPE Secure Stateless Tokenization (SST) on HPE NonStop

Read Solution Brief

BAH Data-Centric Protection: Agility While Protecting Data

Read White Paper

Data Protection and PCI Scope Reduction for Today’s Businesses

Read White Paper

Data Security Protection for HPE Helion

Read Data Sheet

Reputation is Everything –
Protect Your Data, Your Brand

Reputation takes years to build, moments to lose. Controlling borders and layering security isn’t enough to stay off the front page anymore. You need to dramatically change your security strategy. How?

Buy HPE SecureData

How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time? With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.