Transparent Data-at-Rest
Encryption Plug & Play Proxy Container Making end-to-end encryption convenient, safe and inexpensive What
DatabasesView more
How
Plug and Play, No-CodeNo changes needed to your code or software, just switch the DB credentials in your client application and use the setup guide to walk you through the encryption settings. Column Level EncryptionEasily select only critical DB columns for encryption to maintain visibility for real-time DB monitoring and mining of unencrypted columns. Bulk UpdateAdmin control for encrypting or decrypting all pre-existing entries within selected columns, without disrupting normal DB operations. No DB DowntimeConduct full deployment and all ongoing VESencrypt operations while DB remains fully operational — VESencrypt can operate with encrypted and unencrypted data in the same column simultaneously. Flexible DeploymentChoose between deploying an end-to-end Docker container on your host or using a convenient zero-setup Hosted Proxy. Easily transition between the two at any time. Realtime Access ControlGet an instant alert on your device when a new proxy attempts to connect, approve or deny through a secure web console. Why
|