Vormetric Data Security Manager

Remove data security deployment and operational complexity

Centrally manage your organization's data security environment

The Vormetric Data Security Manager (DSM) is the central management point for all Vormetric Data Security Platform products. The DSM not only creates, stores and manages the encryption keys that protect data, it also enables organizations to manage every aspect of their Vormetric data security platform implementation. It allows administrators to specify data access policies, administer DSM users and logical domains, generate usage reports, register new hosts, access security logs, manage third-party keys, digital certificates and more. Moreover, as enterprises and service providers need to manage their data security in concert with their other infrastructure, the DSM also provides integration capabilities with multiple APIs and a command line interface as well as a simple graphical user interface (GUI) operation.

Data Security Manager
Unified, Simplified Management

The Data Security Manager (DSM) enables centralized management of data security policies and key management, simplifying training, deployment and operations.

Flexible Form Factors

The Data Security Manager is available in different form factors and FIPS 140-2 levels. Deploy virtual appliances on-premises, in private and public clouds or select high-assurance hardware with the data security management tool.

Centralize Key and Policy Management

Provision and manage keys for all Thales e-Security products, and manage keys and certificates for third-party devices.

Data Security Manager Graphic

Flexible Deployment Form Factors

The Data Security Manager (DSM) is offered as a FIPS 140-2 Level 1 virtual appliance, as well as two hardware appliances: The V6000, which is FIPS 140-2 Level 2 certified, and the V6100, which is FIPS 140-2 Level 3 certified. The virtual appliance is available in VMware, HyperV, KVM, Amazon Web Services, and Azure compatible formats.

Unified Management and Administration

The DSM provides central management and secure storage of encryption keys, including those generated by Thales e-Security products, KMIP-compliant devices, Microsoft SQL Server TDE, Oracle TDE and IBM Guardium Data Encryption. The data security manager has an intuitive Web-based console, CLI, or APIs for managing encryption keys and policies.

Maximum Security and Reliability

To maximize uptime and security, the DSM features redundant components and the ability to cluster appliances for fault tolerance and high availability. Strong separation-of-duties policies can be enforced to ensure that one administrator does not have complete control over data security activities, encryption keys or administration. In addition, the DSM supports two-factor authentication for administrative access as well as nShield Remote Administration with smart card access in the V6100.

Thales nShield HSM integration

Use Thales nShield Connect HSMs to provide FIPS 140-2 Level 3 root of trust for the virtual or V6000 hardware Vormetric DSM appliances. The DSM V6100 hardware appliance is equipped with an embedded FIPS 140-2 Level 3 nShield Solo HSM root of trust.

BYOK for data encryption keys

Import data encryption keys generated by nShield HSMs, third-party HSMs or other key sources, using RESTful APIs or the DSM management console. These key import capabilities offer flexibility and give organizations more control of data security across cloud services, big data, container, and on-premises environments.

Administrative interfaces: Secure Web, CLI, SOAP, REST
API support: PKCS #11, Microsoft Extensible Key Management (EKM), SOAP, REST
Security authentication: Username/password, RSA two-factor authentication (optional)
Backup: Manual and scheduled secure backups. M of N key restoration.
Network management: SNMP, NTP, Syslog-TCP
Certifications: FIPS 140-2 Level 1, FIPS 140-2 Level 2, FIPS 140-2 Level 3, Common Criteria (ESM PP PM V2.1)

Data Sheet : Vormetric Data Security Platform

The Vormetric Data Security Platform makes it efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, Vormetric Data Security Platform products can be deployed individually, while sharing efficient, centralized key management.


Solution Brief : Bring Your Own Keys

Control data encryption and key generation with Bring Your Own Key (BYOK) Capabilities:

  • Use encryption keys generated by Thales nShield Hardware Security Managers (HSMs), third party HSMs or other key sources with Vormetric Data Security Platform products.
  • Choose high-assurance key sources to meet optimum key strength and compliance requirements.
  • Strongly segment multi-tenant environments by allowing tenants to bring their own encryption keys.


Demo : The Vormetric Transparent Encryption

Watch this short demo to learn how Vormetric Transparent Encryption makes it easy to deploy file and database encryption with privileged user access controls and security intelligence log collection across all your server environments (physical, virtual, big data and cloud) with centralized policy and key management. This demo includes an animated demonstration, policy configuration, insider abuse demonstration, and review of the actual audit logs produced.


Webinar : Cloud Encryption—One Shoe Won’t Fit All

There is no question about the acceleration of data migrating to the cloud. But which cloud? All clouds: a mix of Infrastructure-, Platform- and Software-as-a-Service cloud models are being deployed by almost every organization. When sensitive and regulated data move into these environments different data encryption methods need to be considered.


Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us