Docker Security

Thales eSecurity delivers the strong, centrally managed data access controls you need to protect data in your Docker environments

Docker Security

Vormetric Transparent Encryption Docker Extension, from Thales eSecurity, leverages open Docker APIs and interfaces to enable policy-based encryption, access controls and data access logging for information stored within Docker containers or accessed from Docker. The result is rock solid operation, easy deployment and the protection organizations need to safely deploy production applications that use even the most sensitive information.

Micro service scaling
Exposure to Privileged-User Abuse.

Poor configuration of permissions within the Docker environment or container can result in multiple containers having access to information that should remain private. Further, when Docker containers are hosted in shared virtualized or cloud environments, critical information can be exposed to third parties.

Cross-Container Access

Poor configuration of permissions within the Docker environment or container can result in multiple containers having access to information that should remain private. Further, when containers are hosted in shared virtualized or cloud environments, critical information can be exposed to third parties.

Compliance Risks

Many compliance mandates require strong controls and auditing data access. However, many security teams have limited controls available for managing and tracking access to data that’s held within Docker containers and images. As a result, these teams are finding it difficult to comply with all their relevant internal security policies and regulatory mandates.

Vormetric Data Security

Thales eSecurity delivers the strong, centrally managed data access controls you need to protect data in your Docker environments. The Docker security solution features capabilities for file and volume level encryption, access control, and logging of data access. These data access controls can be applied both to Docker containers and to the underlying operating system that is hosting Docker.

Vormetric Transparent Encryption

Vormetric Transparent Encryption is Thales’ flagship data security solution for managing file encryption and access control at the volume or operating-system level. Vormetric Transparent Encryption enables you to encrypt containers, control access to container images and instances, and ensure container images and backups only run in authorized environments.

Vormetric Transparent Encryption Docker Extension

This Docker encryption solution extends Vormetric Transparent Encryption, enabling security teams to establish controls inside of Docker containers. With this transparent encryption Docker extension, you can apply Docker encryption, access control, and data access logging on a per container basis. Encryption can be applied to data generated and stored locally within the Docker container and to data mounted in the container by network file systems.

Protect against Privileged Users

Prevent abuse by privileged insiders. Vormetric Transparent Encryption Docker Extension guards against unauthorized access to data within containers. You can even keep administrators with root privileges and other privileged users from getting to data they’re not specifically authorized to access.

Leverage Containers and Cloud, without Compromising Security.

With Vormetric Transparent Encryption Docker Extension from Thales eSecurity you can enforce your security policies in dynamic Docker environments and in multi-tenant cloud environments. As a result, the solution enables you to maximize the benefits of these approaches, without making any compromises in security.

Compliance

Address compliance requirements. Whether your organization manages sensitive payment card data, healthcare records, or other sensitive assets, you can use this solution to address the data access control requirements of all pertinent compliance mandates.

eBooks : Thales eSecurity Intel Playbook

The ever evolving landscapes in company goals & objectives make security hard. When it comes to security, the changing threat vectors can scare the most seasoned security and compliance professional. So how do we change the game? Like in any sport, a strong defense plays offense. Download the Intel Security – Vormetric Security Playbook. With these six plays, you’ll gain the strategy to keep your data safe and compliant in the battle that is constantly being waged.

Download

Video : Vormetric Transparent Encryption Demo

Watch this short demo to learn how Vormetric Transparent Encryption makes it easy to deploy file and database encryption with privileged user access controls and security intelligence log collection across all your server environments (physical, virtual, big data and cloud) with centralized policy and key management. This demo includes an animated demonstration, policy configuration, insider abuse demonstration, and review of the actual audit logs produced.

Play

Research and Whitepapers : Vormetric Data Security Platform Architecture

As security teams struggle to contend with more frequent, costly, and sophisticated attacks, data-at-rest encryption becomes an increasingly critical safeguard. This white paper offers an overview of the different encryption approaches available today.

Download
Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us