Data Security and Protection in Virtualized Machines

Thales e-Security security solutions protect data within virtual environments like VMware and other major hypervisor platforms

Virtual Environment Security

Organizations today face a broadening and increasingly sophisticated set of threats to the security of their sensitive data. These include privileged user abuse and advanced persistent threat (APT) attacks. As organizations grow increasingly reliant on virtual servers, their security challenges grow in complexity and scale. Sensitive data grows increasingly mobile. It is copied across many virtual machines. It is spread across the storage infrastructure and an increasingly diverse mix of physical platforms and operating systems. In this kind of environment, organizations need the persistent, robust, flexible, and comprehensive safeguards Thales e-Security provides to ensure sensitive data remains secure and compliant.

Virtual Machine
Data Security in Virtual Machines

When an organization runs sensitive data in fluid virtual machines, that data needs to be secured through robust, persistent, and auditable controls. Without virtual server security, the organization exposes itself to data breaches, penalties for non-compliance and a sullied reputation.

Comprehensive Data Security for Multiple Platforms

Vormetric Transparent Encryption from Thales e-Security delivers the virtual server security capabilities you need to safeguard your sensitive assets. Whether you’re running VMware, Microsoft Hyper-V, KVM (Kernel-based Virtual Machine), or any other standard virtualization platform, Thales e-Security can help you address your critical security compliance requirements, with unparalleled efficiency and low cost of ownership.

Data at Rest Encryption in Virtual Machines

Thales e-Security enables you to encrypt data at the file system or volume level within virtual machines (VMs) and then use fine-grained, centrally managed policies to control access to protected data. As a result, you can enforce security policies and track access, no matter where data is copied or moved.

Granular Access Controls

Vormetric Transparent Encryption from Thales e-Security provides fine-grained, policy-based controls that restrict access to encrypted data. Privileged users—whether cloud, virtualization, or storage administrators—can manage systems, without gaining access to encrypted data, unless they have expressly been granted permissions to do so.


For fast rollouts and integration within virtualized machines, both web and command-line level APIs provide access to the Vormetric Data Security environment for policy management, deployment, and monitoring.


By delivering capabilities for segregating security management domains, Thales e-Security helps organizations address internal security policies and compliance mandates. Further, these security capabilities enable service providers to establish strong boundaries between customer environments, while still leveraging centralized visibility and control of security policies and activities.

Flexible Central Administration

Vormetric Transparent Encryption from Thales e-Security offers support for implementation in a range of Linux and Windows operating systems. All policy and encryption key administration is done through the Vormetric Data Security Manager, which can be deployed as a physical appliance or virtualized service, and either on or off premise, according to your objectives and environments.

White Paper : VMware Product Applicability Guide for Deploying Thales e-Security for PCI DSS Version 3.0 Compliance

This white paper written by a leading QSA, Coalfire, goes through the PCI DSS 3.0 controls in great detail and describes how the Vormetric Data Security Platform deployed in a Payment Card Environment running in VMware can help gain compliance.


Webcast : Safeguarding Data in the Cloud

More and more organisations have enlisted cloud services to save time, money and to introduce more efficiencies into their organisations. End-users have come to love how easily they can access and share information with co-workers – both within the office and remotely. Yet, security professionals must protect the assets traversing these services, and the management must not be overlooked by the executives opting for their use. Access controls, encryption and more all must be considered, along with just who and how corporate data is exposed. We explore some of the more critical security issues executives must consider when relying on the cloud.

Listen Now
Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us