Passar para o conteúdo principal
Produtos
Overview
Criptografia de Dados
Overview
Vormetric Data Security Platform
Vormetric Data Security Manager
Vormetric Transparent Encryption
Overview
Live Data Transformation
Container Security
SAP HANA
Security Intelligence Logs
Vormetric Transparent Encryption (VTE) for Efficient Storage
Selecting the Right Encryption Approach
Dados em Movimento Criptográfico
Overview
SafeNet High Speed Encryptors
Software Monetization Solutions
Entitlement Management
Software Security & Protection
Software Licensing & Usage
product
certifications
Vormetric Application Crypto
Suite
Overview
Geração de Tokens e Mascaramento de Dados
Vormetric Application Encryption
Vormetric Batch Data Transformation
Vormetric Protection for Teradata Database
Static Data Masking
Gerenciamento de Chaves
Overview
CipherTrust Cloud Key Manager
Enterprise Key Management
Authentication & Access Management
SafeNet Trusted Access
Multi-factor authentication
HSMs para Pagamentos
Overview
payShield 10K
payShield Manager
payShield Monitor
General Purpose HSMs
Overview
SafeNet Luna Network HSM
SafeNet Luna PCIe HSM
SafeNet Protect Server
Crypto Command Center
Data Protection On Demand
Overview
CloudHSM
Product Certifications
Overview
FIPS 140-2 Certification
Common Criteria Certification
Soluções
Overview
Por Caso de Uso
Overview
Cloud Security
Overview
Bring Your Own Encryption
Amazon Web Services
Microsoft Azure
Enterprise Users
Key Management
SaaS Security
PKI Security Solutions
Overview
SSL Key Security with HSMs
Secure Digital Signing
DNS Server Solutions
Digital Transformation
Payments
Overview
EMV & Payment Card Issuance
Host Card Emulation
Mobile Card Payments
mPOS
Payment Processing
Point-to-Point Encryption
Data Security & Encryption
Overview
Database Security
Oracle Database Encryption
MSSQL Encryption
NoSQL Encryption
MongoDB Encryption
TDE Key Management
Securing Unstructured Files
Container Security
SAP Data Security
Big Data Encryption
RSA DPM Replacement
Layer 2 Encryption
Tokenization
APTs
Virtual Environment Security
Por Indústria
Overview
Business Services
SaaS Providers
Education
Financial Services
Government
Federal Government
State and Local Government
Healthcare
Insurance Providers
Internet of Things (IoT) Security
Managed Services
Media and Entertainment
Outsourcing
Retail
Pharmacies
Por Conformidade
Overview
Global
Overview
Data Breach Notification Laws
Data Residency
GDPR
ISO 27799:2016 Compliance
ISO/IEC 27002:2013 Compliance
PCI DSS
PCI HSM
SWIFT CSC
Americas
Overview
Brazil – LGPD
FDA/DEA - EPCS
GLBA
HIPAA
Mexico - Data Protection Law
NYDFS Cybersecurity Regulation
NIST 800-53 / FedRAMP
FISMA
FedRAMP
NIST 800-53, Revision 4
FIPS 199 and FIPS 200
FIPS 140-2
NCUA Regulatory Compliance
SOX
NAIC Insurance Data Security Model Law Compliance
California Consumer Privacy Act (CCPA) Compliance
EMEA
Overview
DEFCON 658
PSD2
South Africa POPI Act
APAC
Overview
Australia Privacy Amendment
Japan My Number Compliance
Monetary Authority of Singapore
Philippines Data Privacy Act of 2012
South Korea’s PIPA
UIDAI’s Aadhaar Number Regulation Compliance
Serviços
Professional Services
Overview
Deployment Services
Development Services
Consulting Services
Training
Overview
Training Courses
Support
Overview
Contact Support
Thales Technical Support Centre
Parceiros de Negócios
Overview
Find a Partner
Become a Partner
Channel
Technology
Service Providers
OEM
Channel Partner Portal
Sobre nós
Overview
Leadership
Notícias
Eventos
Blog
Customers
Carreiras
Legal
Industry Associations & Standards Organizations
Contato
Solicite uma demonstração
Search
EN
Oportunidades de emprego
Contact
Blog
Meios
Help
Entrar
Overview
Partner Login
Thales eSecurity Support Login
Vormetric Software Download Portal
English US
English UK
English AU
Español
Português, Portugal
Deutsch
日本語
한국어 (Korean)
Italiano
Русский
Français
Chinese, Simplified(简体中文)
Webinars
Entre em Contato com um Especialista
Chat Conosco
Navegação estrutural
Início
Node
Achieving data security as mandated by UIDAI
Achieving data security as mandated by UIDAI
Watch On Demand
Related Resources
Research and Whitepapers
Vormetric Transparent Encryption for the Sap Hana® Data Management Suite
Download Now
Video
CipherTrust Cloud Key Manager Introduction
View Now
DataSheet
Key Management Device
View Now
Pesquisar