• Vormetric Key Management as a Service
  • Thales e-Security + Vormetric = Better Together
  • 2016 Data Threat Report UK Edition
  • Meeting new eu regulations while protecting your data
  • Securing data-at-rest just got easier and less costly
  • Now you can hide sensitive data in plain sight

Data Security Solutions

Vormetric addresses industry compliance mandates and government regulations globally by securing data in physical, virtual and cloud infrastructures, through Data Encryption, Key Management, Access Policies, Privileged User Control, and Security Intelligence.

Customers Protected

500,000+ SERVERS 17 OF FORTUNE 30 1,500+ CUSTOMERS

Data Security Resource Center

Analyst Reports
  • Analyst Reports
  • Data Security Blog
  • Customer Success
  • Solution Briefs
  • Videos
  • Webcasts
  • White Papers

Analyst Reports

Peak 10 launches encryption as a Servi...

The 451 Take

Managed infrastructure providers can and do help supply their customers with...


Gartner Market Guide for Merchant/Acqu...

The tokenization of sensitive data is a key component in the ensuring of payment system security...


Data Security Blog

Last year we hit a turning point in cloud adoption for applications processing sensitive data.  According to our latest Ponemon/Thales Global Encryption Trends Study, for the first time more enterprises are sending sensitive data to the cloud than...

I’m sure you’ve seen endless articles about organizations jumping on the cloud computing bandwagon. I know what you’re thinking, how very 2013. But there is a fast growing trend in this shift to the “cloud” movement with enterprises increasingly d...

Customer Success

Trapwire Enhances Its Security...

Founded in the wake of the September 11th, 2001 attacks on the U.S., TRAPWIRE puts data analysis to work to keep the country safe. Paul Chadha, director of products and technology, explained, “We...


Japanese Hospital Network Leverages...

The St. Marianna Association is a network of hospitals and a medical school in the greater Tokyo area. Founded shortly after World War II, it pioneered treatment for displaced civilians and soldiers...


Solution Briefs

Key Management For Salesforce Shiel...

Salesforce Shield Platform Encryption service is a powerful tool to secure and control sensitive fields and attachments through natively integrated data-at-rest encryption. However, to meet many...


Dell Storage SC Series & Vormet...

For IT and security teams today, adaptation is a key part of the job. Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms,...



Demo: Vormetric Content Packs on McAfee Enterprise...

View how Vormetric Content Packs work with McAfee ESM to provide an "inside view" feed in order to guard against the insider threat.


Vormetric Transparent Encryption Demo

Watch this short demo to learn how Vormetric Transparent Encryption makes it easy to deploy file and database encryption with privileged user access controls and security intelligence log collection across all your server...



Webinar: Protecting Your Data at Rest in Apache Kafka

Date: Thursday, September 8, 2016 Time: 10am PT | 1pm ET | 7pm CET This webinar will cover the basics of Apache Kafka and the broader Confluent Platform ACL authentication and policy-driven encryption practices for data-at-rest and secure platform...


Webinar: Protecting Data in line with the Australian Data Breach Notification – A Best Practice Guide.

Date: Thursday 15th September, 2016 Time: 4.00pm Sydney Time Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the...


White Papers

Hadoop with Vormetric Transparent...

Hadoop has rapidly gained acceptance in the enterprise and is becoming a central repository for all the data in an enterprise. The data is extensively mined and analyzed by several different...


Discover How to Efficiently...

The cyber attacks being waged against government agencies continue to get more frequent, fast changing, and evasive. The Department of Homeland Security (DHS) created the Continuous Diagnostics...



U.S. retailers, are protecting data for the right reasons, and nearly half have a good track record of safeguarding sensitive data. Protecting reputation and brand integrity was the top reason for securing sensitive.

Garrett Bekker
Senior IT Security Analyst
451 Research


Enterprise Data Security for Cloud Environments

Market Guide for Tokenization Vendors

Download >>

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental