Trustway DataProtect DB
Trustway DataProtect DB provides your organization with total protection of your databases, whether deployed in a data center or in the cloud.
In combination with Trustway DataProtect KMS based on certified architecture, Trustway DataProtect DB provides your organization with the highest level of database confidentiality, thanks to centralized control of data access and a regular key rotation. You have the freedom to directly select which data fields are encrypted.
The solution enables large amounts of sensitive data to be moved in and out of data stores by efficiently encrypting and decrypting specific fields in databases. It requires no changes to applications, and Trustway DataProtect DB can scale to support multiple data centers in on-premises, virtual and public cloud environments.
Follow or contact us:

Centralize management
Based on a HSM architecture, this unified platform provides key management and encryption services for all your infrastructure solutions. Enhanced by monitoring and granular access control features, it guarantees your company a unique data protection policy and reduces the cost of compliance and audit.

Implement column-level encryption
Transparently encrypt sensitive data in your databases at the column level — even during batch-driven data transformation and transaction processes.

Achieve compliance
Meet compliance mandates such as GDPR, PCI DSS and HIPAA, which require data encryption and separation of duties.
Transparent and efficient column-level encryption
- Transparently encrypt sensitive column-level database data
- Apply granular access controls to ensure only authorized users or applications can view protected data
- Prevent database administrators (DBAs) from impersonating other users to access sensitive data
Deliver high performance
- Perform cryptographic operations locally or offload to Trustway Key Manager to leverage external processing power
- Built-in connection pooling, health checks and multi-tiered load balancing
Support cloud initiatives
- Deploy across on-premises, virtual and public cloud environments
- Set up encryption in the cloud easily and quickly with Chef® recipes for automation
Streamline ongoing management activities
- Built-in, seamless key rotation and data re-keying
- Reduce administration and overhead costs with centralized policy and key management
HSM certifications
- Common Criteria EAL4+ compliant with CWA 14167-2 PP
- FIPS 140-2 Level 3 (in progress)
- EU RESTRICTED
- NATO SECRET
- Qualification Renforcée (the highest qualification from ANSSI)
- Compliant with eIDAS
Supported databases: Oracle, Microsoft SQL Server, IBM DB2
Supported platforms: Microsoft Windows, Linux, Solaris, HP-UX, AIX
Encryption algorithms: AES 128, 192, 256,512 and 3DES 168
Cloud and virtual infrastructures: Works with all major cloud platforms, including AWS, Microsoft Azure and VMware
Trustway DataProtect offers a comprehensive data protection solution to guarantee data security and the control on the data access.
This solution provides the customer with the tools to the capabilities to encrypt all the data format as Virtual Machine, Database, File system, Application and Tokenization. Trustway DataProtect is a complete solution for cloud, virtual and on-premises infrastructures and is compliant with the most restrictive data privacy regulations as GDPR, HIPAA or PCI DSS.
Trustway DataProtect KMS >>
Trustway DataProtect KMS is a centralized key management administration platform. This standards-compliant interface (PKCS#1) allows you to manage keys on every environment (cloud, virtual, on-premises) to enable information system audits and robust access control.
Trustway DataProtect App >>
Connected to Trustway DataProtect KMS, Trustway DataProtect App is a highly-secure application encryption solution which centralizes administration of application encryption policy and keys. This solution is suitable for a wide range of web application servers and enterprise applications.
Trustway DataProtect VM >>
Connected to Trustway DataProtect KMS, Trustway DataProtect VM brings complete cloud data protection, guaranteeing your organization a secure migration to the cloud, ensuring only authorized users can access information, and meeting compliance mandates. With Trustway DataProtect VM, you can now isolate and totally control your virtual machine instances.
Trustway DataProtect File >>
Connected to Trustway DataProtect KMS, Trustway DataProtect File ensures data security, denying unauthorized user access to your files through fully automated file encryption of unstructured data contained in network drives and file servers.
Trustway DataProtect Token >>
Connected to Trustway DataProtect KMS, the Trustway DataProtect Token solution protects sensitive information by replacing it with a surrogate value that preserves the length and format of the original data. This solution can be deployed across cloud, virtual and on-premises environments to secure data such as credit cards, social security numbers, etc.
Related resources
Factsheet
Trustway DataProtect DB: Total protection for your database, in the data center and the cloud
Trustway DataProtect DB brings your organization total database protection in the data center and in the cloud, thanks to centralized data access control and regular key rotation.
Brochure
Download: Securing your end-to-end infrastructure with unified encryption
Discover Trustway DataProtect, a data protection solution that secures your data, regardless of the location — whether stored in a database, file server, application, traditional or virtualized data center, or public cloud environment.
White paper
Download: Prevent ransomware attacks from taking down your business and defend your data
Emergency situations provide a conducive environment for cyberattacks. Ransomware attacks are on the rise today, and organizations face higher risk of’ sensitive data being stolen. Read our white paper to learn more about ransomware and how to protect your sensitive data.
Brochure
Trustway HSM: Data Security – Choosing the right path through compliance
Compliant, flexible and innovative, our range of hardware security modules provides companies and critical infrastructures with the reliability of an innovative and robust architecture that complies with strict security demands.