Pervasive Encryption: What Is It and How Does It Protect? - Download White Paper (PDF)


Pervasive Encryption: What Is It and How Does It Protect?

Pervasive Encryption

The future of data protection is closer than you may think and it involves a new application of a current technology. It is encryption, used in a new way, to exploit the power of computing. Enter the world of pervasive encryption.

What is and how does it work? How can it help to make data more secure?

Pervasive Encryption is a new approach to extensive encryption of both data-in-flight and at-rest, enabled by administrative policy controls in mainframe systems. In the past, for example, the mainframe data encryption rested on on-chip cryptography and cryptocards, that limited de facto software-hardware interactions. Pervasive encryption enables customers to encrypt data in databases, data sets, or disk levels.

Perhaps the most important benefit of Pervasive Encryption to customers is that it doesn’t require them to change or adjust applications. Pervasive Encryption allows each app to have internal encryption-decryption mechanism, allowing this type of encryption to be application transparent.

Also, with the upcoming GDPR, which will govern the way personal data of EU citizens is protected, data-based companies have a strong ally in Pervasive Encryption, not only because of its cost friendly nature, but because it adjusts to high demand and the rapid phase era of cloud computing and the data-driven economy.


Disclaimer: By downloading this whitepaper from onlinewhitepapers.com, you will automatically be subscribed to our weekly newsletter. If you do not wish to receive our weekly newsletter, please unsubscribe using the link available in the newsletter. Unsubscribing from our newsletter will not affect your ability to download future whitepapers. Thank you. ( View our email privacy policy here. )