Compare Protegrity Data Security vs. Vormetric Application Crypto Suite

Cancel
You must select at least 2 products to compare!
Questions from the Community
Ask a question

Earn 20 points

Top Answer: I have been working with Guardium for 5 years, but I had not heard of Vormetric. So, I will not be able to help. Something I can report is from the IBM website: " IBM Security Guardium Data… more »
Ranking
8th
out of 26 in Data Masking
Views
1,335
Comparisons
1,015
Reviews
0
Average Words per Review
0
Rating
N/A
11th
out of 26 in Data Masking
Views
387
Comparisons
357
Reviews
0
Average Words per Review
0
Rating
N/A
Find out what your peers are saying about IBM, Delphix, Broadcom and others in Data Masking. Updated: March 2021.
475,208 professionals have used our research since 2012.
Popular Comparisons
Learn More
Overview

Organizations leveraging networked applications and services benefit from the flexibility and convenience of being able to create and access data across multiple devices and users. At the same time, sensitive data, including health and personally identifiable information, may need to be protected or de-identified to satisfy regulations or internal privacy policies.

Protegrity Data Security Gateway addresses these security, privacy, and compliance risks with advanced encryption and tokenization to transparently protect sensitive data as it moves across the network. By securing data in real-time as it is transmitted, enterprises are assured that data automatically adhere to rules governing sensitive data at all times.

Transparently protect sensitive data across the network without modifying applications or database calls. Protect applications and API’s quickly without impacting your business.

At the core of the Vormetric Application Crypto Suite from Thales is a set of products that streamline development efforts to add encryption, tokenization, masking and other cryptographic functions to applications. The job of the developer is made easy and fast by leveraging sample code and APIs that are best for their environment, while key management functions are kept separate and secure in a FIPS 140-2 hardware or virtual appliance that is operated by IT or SecOps. Securing data at the application, with separation of duties for key management, provides the highest levels of protection and compliance.

The Vormetric Application Crypto Suite also includes applications and utilities that leverage the core components to add security layers to databases and other structured data stores.

Offer
Learn more about Protegrity Data Security
Learn more about Vormetric Application Crypto Suite
Sample Customers
A $4 billion retail conglomerate and holding company
BD, Delta Dental, CMI
Top Industries
VISITORS READING REVIEWS
Computer Software Company39%
Financial Services Firm11%
Comms Service Provider11%
Insurance Company7%
VISITORS READING REVIEWS
Computer Software Company32%
Financial Services Firm20%
Comms Service Provider16%
Insurance Company8%
Find out what your peers are saying about IBM, Delphix, Broadcom and others in Data Masking. Updated: March 2021.
475,208 professionals have used our research since 2012.

Protegrity Data Security is ranked 8th in Data Masking while Vormetric Application Crypto Suite is ranked 11th in Data Masking. Protegrity Data Security is rated 0.0, while Vormetric Application Crypto Suite is rated 0.0. On the other hand, Protegrity Data Security is most compared with Micro Focus Voltage SecureData Enterprise, Informatica Persistent Data Masking, IBM Guardium Data Protection, Informatica Dynamic Data Masking and IBM InfoSphere Optim, whereas Vormetric Application Crypto Suite is most compared with IBM Guardium Data Protection, Micro Focus Voltage SecureData Enterprise, Privitar Publisher and Delphix.

See our list of best Data Masking vendors.

We monitor all Data Masking reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.