PK Encryption - Onefede
Onefede > Products > PK Encryption

PK Encryption

Sold by: PKWARE Category:

Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure.

Report Abuse

Description

Data is the new currency for businesses so protecting it is paramount to protecting the organizations using it. With PK Encryption, powered by the merger of Dataguise and PKWARE technologies, businesses can encrypt files and databases, as well as data that is being transmitted, by converting usable data into an unreadable form and providing decryption to those with proper access to reverse the process.

Icon designPersistent File
Encryption

Apply protection to the data itself for hundreds of file types so sensitive information stays encrypted no matter where it is stored, shared, or copied.

Icon designFormat Preserving
Encryption

Encrypt data while preserving the formatting and length of the original data.

Icon designTransparent
Data Encryption

Protect data at rest on enterprise servers and automatically encrypt/decrypt as data is read/written across the network.

Icon designDynamic Data
Encryption

Encrypt the data while it’s in motion, especially for migration or an ETL process.

Icon designSingle, Automated
Workflow

Invoke discovery processes that automate encryption workflows.

Icon designControlled
Encryption

Provide mechanisms for decrypting and discovering data that is encrypted from uncontrolled third-party applications.

Icon designExtensive Protection
Capabilities

Automate policy-based encryption for sensitive data in TXT, AVRO, Sequence, RC, ORC, JSON, XML file formats, and more.

Icon designInside and
Outside Control

Sensitive data remains safe even when it’s sent to users outside the organization.

Icon designEndpoint, Cloud
and On-Prem

Encrypt data at endpoints such as laptops, desktops, and mobile devices, as well as in large-scale cloud storage systems, database systems, and file servers.

Icon designElement and
Column-Level Encryption

Encrypt sensitive elements in unstructured files and cloud storage objects, and sensitive columns in databases and structured files.

Icon designEmail
Encryption

Seamlessly and securely send end-to-end encrypted emails internally and externally while preserving user workflows.

Icon designIBM Z and IBM I
Leveraged Crypto Hardware

Extend IBM Pervasive Encryption® and leverage IBM CPACF, zIIP and zEDC for IBM Z and FIPS-140 compliant PCIe3 Crypto Coprocessor for IBM I.

Customer Reviews

Customer Ratings

$0.00
Stars 5
(0)
Stars 4
(0)
Stars 3
(0)
Stars 2
(0)
Stars 1
(0)
Be the first to review “PK Encryption”

Your email address will not be published.

Reviews

There are no reviews yet.

Vendor Information

Description

With more than 30 years in data security, PKWARE is one of the most trusted names in the industry. We invented the ZIP file, the world’s most widely-used archive format, and have continued to innovate through the years, developing new technologies and new strategies for a constantly-changing world.

PKWARE’s Data Security Platform removes the guesswork and legwork for customers by eliminating data security gaps, automating the management and protection of sensitive information, and meeting data compliance goals—all with the ability to tailor the solutions to the unique needs of their industry.

Range and Applicability

We offer the broadest support in the market. Our data discovery capabilities cover: Relation Databases (RDBMS), Structured Data, Data Warehouses, Big Data Hadoop Platforms, NoSQL Databases, Cloud Object Stores, Inflight Data Transfers, Endpoint and File Servers.

Automation

Organizations need security solutions that apply data protection policies in real-time, across the entire enterprise, without user intervention. Supported by PKWARE’s unmatched powerful automation capabilities, IT personnel and executives can focus more on their business needs and strategy, and less on monitoring the security of their technology.  PKWARE solutions focus on what needs to be protected, and then apply the right forms of protection, regardless of where the data lives.

Rule-Based Remediation

Data security is not a one-size-fits-all proposition. Within a single organization, there can be dozens of security policies, hundreds of data types, and thousands of use cases. Some data might require encryption, while other data may need to be masked, redacted, deleted, or quarantined.

With PKWARE, your policies can be as general or specific as necessary in order to meet your goals. Administrators can define specific actions (or sequences of actions) to be applied based on file contents, file types, storage locations, user profiles, and other criteria.

Persistent Protection

Data rarely stays in one place. Sensitive information is constantly being duplicated and shared, often in locations outside the organization’s control. Solutions that protect data only on certain devices or in certain situations can create security gaps and compliance risks. PKWARE provides remediation options (including persistent encryption) that permanently protect data against inappropriate use, even when the data travels beyond the company network.

Integration and Scalability

Enterprise security ecosystems are complex and constantly evolving. PKWARE technology is built to fit into your existing environment and to grow and change along with you. Our solutions work on every enterprise operating system and integrate with DLP systems, productivity software, reporting tools, and other elements of your IT infrastructure. In addition, our scalable software is simple to use on a broad range of data types and repositories, enabling visibility and control even in the fastest-moving, most complex IT environments.

Centralized Control

Centralized management is essential to ensure that data is protected according to the organization’s security policies while remaining available for appropriate use. PKWARE’s management console gives organizations complete control over their sensitive data for the entire lifecycle of the data, wherever it lives. Access to protected data can be granted or revoked at any time, and all activity is logged for auditing and reporting.

 

  • PK Masking

    $0.00

    Maintain Control of Sensitive Data

    Fully utilized data is an enterprise’s most valuable asset. But data without protection becomes a liability. Masking personal, confidential, or otherwise sensitive information allows data to be desensitized or protected while still remaining usable by business teams. It’s a straightforward concept, but businesses have to consider certain complexities and subtleties to ensure their masked data remains fit for purpose.

    PK Masking

    Category: Data Masking |

    Maintain Control of Sensitive Data

    Fully utilized data is an enterprise’s most valuable asset. But data without protection becomes a liability. Masking personal, confidential, or otherwise sensitive information allows data to be desensitized or protected while still remaining usable by business teams. It’s a straightforward concept, but businesses have to consider certain complexities and subtleties to ensure their masked data remains fit for purpose.
  • PK Discovery

    $0.00

    Where Sensitive Data Resides

    Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears.

    PK Discovery

    Where Sensitive Data Resides

    Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears.
  • PK Classification

    $0.00
    Data classification solutions are an essential component of helping organizations categorize and secure data based on custom or predefined policies used to ensure the security of personal and sensitive data. Systematic, enterprise-wise file classification simplifies compliance, improves end-user awareness of security policies, and makes other security technology more effective.
    Classification Interoperability

    Secure and categorize what kind of data you have, faster, with automated classification integration. PKWARE and Dataguise have joined together to offer:

    Icon designMap What You Have

    Automatically apply tags to files into business-level terms, such as confidential, public, and restricted

    Icon designReport on Data

    Understand exactly what kind of data exists and where it is located

    Icon designTagging Options

    Automatically apply labels to files and enable users to tag files

    Icon designIntegration Capabilities

    Discover and protect data tagged by classification solutions such as: Microsoft, Titus, Bolden James, and more.

    PK Classification

    Category: Data Security |
    Data classification solutions are an essential component of helping organizations categorize and secure data based on custom or predefined policies used to ensure the security of personal and sensitive data. Systematic, enterprise-wise file classification simplifies compliance, improves end-user awareness of security policies, and makes other security technology more effective.
    Classification Interoperability

    Secure and categorize what kind of data you have, faster, with automated classification integration. PKWARE and Dataguise have joined together to offer:

    Icon designMap What You Have

    Automatically apply tags to files into business-level terms, such as confidential, public, and restricted

    Icon designReport on Data

    Understand exactly what kind of data exists and where it is located

    Icon designTagging Options

    Automatically apply labels to files and enable users to tag files

    Icon designIntegration Capabilities

    Discover and protect data tagged by classification solutions such as: Microsoft, Titus, Bolden James, and more.

  • PK Privacy

    $0.00

    Index Identities and Related Data

    Today, businesses are required to stay on top of the privacy rights of hundreds of thousands—perhaps even millions—of individuals protected by multiple regulations. Meeting these requirements for privacy starts with understanding the variables and makeup of your different data subject groups relevant to each regulatory restriction. With PK Privacy, organizations have the methodologies, tools, and techniques to achieve required and acceptable levels of privacy.

    PK Privacy

    Category: Data Security |

    Index Identities and Related Data

    Today, businesses are required to stay on top of the privacy rights of hundreds of thousands—perhaps even millions—of individuals protected by multiple regulations. Meeting these requirements for privacy starts with understanding the variables and makeup of your different data subject groups relevant to each regulatory restriction. With PK Privacy, organizations have the methodologies, tools, and techniques to achieve required and acceptable levels of privacy.

Product Inquiry

Item added To cart