Trustway DataProtect Data encryption for guaranteed data security and access control Introduction Key numbers What for? Key benefits Solution Certifications Related resources Our team Contact us How can you ensure data security and compliance? In a world full of threats and cyberattacks, securing user data is a priority. In a regulatory environment that gets stronger day-by-day, concern is to guarantee data confidentiality – whether in a data center, or in the cloud, or on-premise. Key numbers 0 + years of encryption expertise 0 + Certifications & Qualifications 0 % European cryptography manufactured 0 + Crypto experts 0 + Worldwide Partners What is Trustway DataProtect? Trustway DataProtect is a single, unified platform for key management across environments, geographies, and siloes of encryption deployments to keep your data safe. It offers a comprehensive data encryption solution to provide organizations with the tools and the capabilities to encrypt any data format, including virtual machines, databases, file systems, applications and tokenization. Trustway DataProtect is a complete solution for cloud, virtual and on-premises infrastructures and complies with the most restrictive data privacy regulations like GDPR, eIDAS, HIPAA or PCI DSS. Trustway DataProtect a centralized Key management Appliance, based on Trustway Proteccio™ HSM as Root of Trust. Key benefits Any data format Works across physical, virtual or cloud deployments KMIP compatible Integrated with a wide range of KMIP-compatible encryption solutions from diverse vendors Mode Local or remote mode of cryptographic operations Key storage Policy-driven automated key rotation Scalability Scalable, and supports Active-Active configuration Security policy Will insure a seamless deployment and security policy between all your services Trustway DataProtect, a unified solution - encryption wherever the data is locatedApplication encryptionDatabase encryptionTokenizationVM encryptionFile encryptionApplication encryption Crypto and encryption Software Development Kit (SDK) The Application encryption connector empowers users to encrypt structured and unstructured data immediately upon generation, safeguarding it before it spread to different environments and infrastructure. Application encryption connector features built-in, automated key rotation and data re-keying and can also perform a wide range of cryptographic operations including encryption, decryption, digital signing and verification, secure hash algorithms (SHA) and hash-based message authentication code (HMAC). The solution provides a single interface for logging, auditing, and reporting access to protected data and encryption keys. Database encryption Encryption of sensitive and high-volume data The Database encryption connector provides transparent column-level encryption of structured, sensitive data residing in databases. The solution enables large amounts of sensitive data to be moved in and out of data stores by efficiently encrypting and decrypting database. No changes are required to applications and Database encryption connector can scale to support multiple data centers in on-premises, virtual and public cloud environments. The database encryption is done either with CTE, Application encryption or External Key Management, depending on customer specific needs. Tokenization Replacing sensitive data with a token (crypto generated) Tokenization connector replaces sensitive data with a unique token (surrogate value) that is stored, processed or transmitted in place of the original data. The solution offers unlimited data type support, including numeric data with spaces or dashes (e.g. credit card numbers, social security numbers), alphanumeric data (e.g. passport, account, email addresses, dates) and original data retrieval formats, such as full clear value or masked. We can also provide Vaulted tokenization used for specific Database in order to connect tokenized and detokenized data. VM encryption Encrypt Virtual Machines (VMs) globally (KMIP based) Used as a VM connector, KMIP serves as a universal intermediary for key management systems, enabling different software and hardware devices to securely communicate and exchange encryption keys using a standardized approach. This ensures that keys created by one system can be easily shared and utilized by another system without encountering any compatibility problems. File encryption File system level encryption The File encryption connector guarantees the utmost data security by automating the encryption and the protection of data either at the file level or at the storage device level. This process ensures that unauthorized users can no longer access or read your files. The File encryption connector provides your organization with the highest level of file security, meeting the most stringent international security standards available. Certifications The tamper-proof design of Trustway Proteccio netHSM has been certified with: Common criteria EAL4+ certification The cryptographic module The communication module ANSSI QR (Enhanced Qualification) Highest level of qualification The only HSM with Enhanced Qualification European agreements 100% European cryptography CC EAL4+ NATO SECRET ANSSI QR eIDAS SOG-IS Other encryption products Offer Trustway Proteccio NetHSM Secure your most sensitive data with Trustway Proteccio™ NetHSM, the only HSM with the French national cybersecurity agency ‘s “reinforced qualification”. Learn more Offer Trustway Proteccio OEM Trustway Proteccio™ OEM provides editors and integrators with an open and secure hardware platform for designing certified and scalable cryptographic appliances. Learn more Offer Trustway Crypt2pay Trustway Crypt2pay is a high-performance encryption device designed to secure transactions involving bank or private cards. Learn more Offer Trustway IP Protect With Trustway IP Protect, secure your network communication across IP networks between devices geographically separated to protect data in transit. Learn more Related resources Factsheet Trustway DataProtect Trustway DataProtect is a data encryption platform, based on our Trustway Proteccio™ HSM, for every environment (cloud, virtual, on-premise). Read more Brochure Data Security with a HSM Our Hardware Security Module (HSM) offers software solutions within a highly secure and high-performance environment, enabling the execution of the most sensitive cryptographic operations. Read more Our team Antoine Schweitzer-Chaput Head of BU Trustway Corentin Cordier Cybersecurity Product Owner Charles Piron Global Sales Director Follow us! Interested in our Trustway DataProtect solution, contact our cybersecurity experts Contact Us Get in Touch! Thank you for your interest. You can download the report here. A member of our team will be in touch with you shortly