Did you know GDPR Article 34 waives the requirement for public breach notification if the data stolen is encrypted? Avoid the negative headlines and protect your brand with Format Preserving Encryption (FPE) on data used and stored in your Vertica Analytics Platform.
GDPR is the world’s most important regulation involving protection of individuals’ information, because data is the currency of successful business.
To help mitigate the risks associated with the processing of sensitive data, GDPR recommends encrypting your data. The Voltage SecureData Add-on for Vertica brings a unique data-centric approach to the encryption of data in Vertica, with sensitive information preserved end-to-end, from the moment of capture through business analysis applications and to the back-end data store.
The Benefits of Integrating Voltage SecureData with your Vertica Database
Protect data in-use for analytics
Increase access to data for faster insights and time-to-value, while ensuring persistent protection of sensitive data from the source through the data life-cycle.
Comply with GDPR and data privacy
Protect personal data in line with recommendations for using encryption as a mechanism to protect data (Article 32). GDPR waives the requirement for breach notification if the data stolen is encrypted (Article 34).
Reduce the risk of data breaches
De-identify data, rendering it useless to attackers, while maintaining its usability, usefulness, and referential integrity for data processes, applications, and analytics.
Integrate with Vertica seamlessly
Vertica seamlessly integrates with Voltage Format-Preserving Encryption (FPE) and can be easily purchased as an add-on to your current Vertica license.
Webcast: Secure your Big Data Analytics for GDPR Compliance
Tuesday, October 30th, 1pm ET
Can you protect personal data in Vertica while increasing data access, and enabling compliance with GDPR and other data privacy regulations?
Join this webcast to learn how Voltage SecureData for Vertica enables trusted big data to move between untrusted environments. This combined solution allows data protection to persist as data moves from storage to in-flight to in-use without requiring changes to downstream applications.