oracle-encryption-page-banner

Oracle Database Encryption: Safeguarding Sensitive Data

Thales' CipherTrust solutions employ transparent encryption and key management to secure all leading databases, including all versions of Oracle

Oracle Database Encryption: Safeguarding Sensitive Data

The CipherTrust Data Security Platform enables you to encrypt and secure sensitive assets in your Oracle databases while avoiding the challenges traditionally associated with Oracle TDE or Oracle column encryption.

  • Challenges
  • Solutions
  • Benefits

Negative Performance Impacts

Oracle offers Oracle Transparent Data Encryption (TDE), which performs all encryption operations within the Oracle database itself. This results in a significant impact on database server resources.

Administrative Complexity of Using Oracle TDE

In most organizations, Oracle will be just one of a number of areas where encryption is needed. Because Oracle Transparent Data Encryption (TDE) only supports encryption in Oracle environments, this means separate products, training and workflows for multiple encryption implementations, increasing the cost and administrative effort associated with encryption.

Inefficient and Complex Key Management

Oracle TDE only offers minimal capabilities for managing encryption keys. Given that each instance of Oracle requires a separate encryption key, having separate, disparately supported key managers results in a high degree of complexity, and exacerbates the risks of having keys lost or stolen.

CipherTrust Transparent Encryption

CipherTrust Transparent Encryption offers the capabilities you need to employ strong Oracle database encryption with minimal effort and performance implications. With CipherTrust Transparent Encryption you can secure sensitive assets in your Oracle databases and all the other databases running across your enterprise.

CipherTrust Application Encryption

For organizations that need to apply more granular encryption, including at the column or field level within databases, Thales offers CipherTrust Application Encryption, which simplifies the integration of encryption into existing corporate applications. The product features standards-based APIs, which are used to perform cryptographic and key management operations.

CipherTrust Key Management for Oracle Encryption

For enterprises that have chosen to use Oracle TDE in their Oracle databases, Thales offers secure and efficient cryptographic key management. CipherTrust Key Management can centrally manage keys for Oracle TDE, all Thales CipherTrust products, Microsoft SQL Server TDE, and other Key Management Interoperability Protocol (KMIP) compliant encryption platforms. As a result, organizations can centrally and securely manage all their encryption keys, while streamlining key administration efforts.

Encryption for all Enterprise Databases

While Oracle TDE can protect data within the database, Thales CipherTrust Oracle encryption solutions secure data both inside and outside of the database. We also provide database encryption for IBM DB2, Microsoft SQL Server, MySQL, NoSQL, and Sybase. Thales CipherTrust solutions secure data on Windows, Linux, and UNIX operating systems, and they offer coverage of physical, virtual, and cloud-based servers.

Operational Efficiency

By offering a single console for managing encryption policies and cryptographic keys across a number of environments and technologies, CipherTrust encryption solutions from Thales minimize administrative overhead. With this unified coverage, Thales helps security teams avoid database encryption silos, reduce costs, and apply security policies more broadly and consistently.

Robust, Scalable Performance that Meets Your Requirements

Compared to Oracle TDE, CypherTrust Transparent Encryption offers far superior performance. With the CipherTrust Oracle encryption solution, encryption and decryption are performed at the optimal location: in the file system or volume manager. Further, the solution can take advantage of microprocessor encryption technology, such as Intel AES-NI, to further minimize the performance overhead of encryption.

  • Related Resources