Trustway DataProtect File
Trustway DataProtect File provides transparent and automated file system-level encryption of file servers or shares.
Today, perimeter-based security defenses cannot adequately secure the growing volume of sensitive data residing on servers in physical, virtualized, and public cloud storage environments. To be completely protected, organizations must employ a solution that attaches security to the data itself.
Trustway DataProtect File ensures data security through fully automated file encryption of unstructured data contained in network drives and file servers, ensuring that your files can no longer be read by unauthorized users.
In combination with Trustway DataProtect KMS based on certified architecture, Trustway DataProtect File gives your organization the highest level of file security and meets the strictest international security standards.
Follow or contact us:

Centralize management
Based on HSM architecture, this unified platform provides key management and encryption services for all your infrastructure solutions. Enhanced by monitoring and granular access control features, it guarantees a unique data protection policy for your company and reduces compliance and audit costs.

Strengthen security
Fully automated file encryption of unstructured data contained in network drives and file servers ensures that your files cannot be read by unauthorized users.

Achieve compliance
A highly available encryption solution to address numerous industry security standards and government regulations such as PCI DSS, GDPR, and HIPAA…
Transparent, strong, efficient encryption
- Apply transparent, automated file system-level encryption in physical, virtual and cloud environments
- Define and enforce granular access control policies
Privileged user control
- Prevent rogue root administrators from impersonating other users and accessing protected data
Multi-language support
- Encrypt files and folders written in Arabic, Japanese, Korean and other languages, meaning encryption and global collaboration are no longer mutually exclusive
Secure data archival and destruction
- Keep data encrypted and unreadable by server administrators performing back-up and restore tasks
- Ensure all secure, sensitive data is rendered unreadable in the event that data destruction is required
Easy implementation and management
- Utilize remote, silent automation tools for quick and easy deployment in large and small environments
- Streamline administration with centralized policy and key management in FIPS certified hardware
- Built-in, automated key rotation
- Set up encryption in the cloud more quickly with Chef® recipes for automation
HSM certifications
- Common Criteria EAL4+ compliant with CWA 14167-2 PP
- FIPS 140-2 Level 3 (in progress)
- EU RESTRICTED
- NATO SECRET
- Qualification Renforcée (the highest qualification from ANSSI)
- Compliant with eIDAS
File-system level encryption
– Servers: A file server, web server, application server, database server, or other machine running compatible software
– Network shares: SMB/CIFS, NFS
– Remote silent installation for easy deployment in any size environment
Encryption algorithms
– AES
Supported platforms
– Linux: Oracle, Red Hat Enterprise Linux, SUSE,
– Microsoft Windows
– Big Data: Apache Hadoop, IBM InfoSphere BigInsights
– Cloud: All public clouds, including AWS,
– Cloud Management: Chef
– Databases: Cassandra, IBM DB2, Microsoft SQL Server, Microsoft SharePoint, mongoDB, Oracle, Couchbase
– Containers: Docker
Trustway DataProtect offers a comprehensive data protection solution to guarantee data security and the control on the data access.
This solution provides the customer with the tools to the capabilities to encrypt all the data format as Virtual Machine, Database, File system, Application and Tokenization. Trustway DataProtect is a complete solution for cloud, virtual and on-premises infrastructures and is compliant with the most restrictive data privacy regulations as GDPR, HIPAA or PCI DSS.
Trustway DataProtect KMS >>
Trustway DataProtect KMS is a centralized key management administration platform. This standards-compliant interface (PKCS#1) allows you to manage keys on every environment (cloud, virtual, on-premises) to enable information system audits and robust access control.
Trustway DataProtect DB >>
Connected to Trustway DataProtect KMS, Trustway DataProtect DB provides your organization with total database protection in the data center and the cloud, thanks to centralized control and a regular key rotation. You directly select which data fields to encrypt.
Trustway DataProtect VM >>
Connected to Trustway DataProtect KMS, Trustway DataProtect VM brings complete cloud data protection, guaranteeing your organization a secure migration to the cloud, ensuring only authorized users can access information, and meeting compliance mandates. With Trustway DataProtect VM, you can now isolate and totally control your virtual machine instances.
Trustway DataProtect App >>
Connected to Trustway DataProtect KMS, Trustway DataProtect App is a highly-secure application encryption solution which centralizes administration of application encryption policy and keys. This solution is suitable for a wide range of web application servers and enterprise applications.
Trustway DataProtect Token >>
Connected to Trustway DataProtect KMS, the Trustway DataProtect Token solution protects sensitive information by replacing it with a surrogate value that preserves the length and format of the original data. This solution can be deployed across cloud, virtual and on-premises environments to secure data such as credit cards, social security numbers, etc.
Related resources
Factsheet
Trustway DataProtect File: Total protection of your file systems
Trustway DataProtect File brings your organization total file system protection thanks to centralized control of data access.
Brochure
Download: Securing your end-to-end infrastructure with unified encryption
Discover Trustway DataProtect, a data protection solution that secures your data, regardless of the location — whether stored in a database, file server, application, traditional or virtualized data center, or public cloud environment.
White paper
Download: Prevent ransomware attacks from taking down your business and defend your data
Emergency situations provide a conducive environment for cyberattacks. Ransomware attacks are on the rise today, and organizations face higher risk of’ sensitive data being stolen. Read our white paper to learn more about ransomware and how to protect your sensitive data.
Brochure
Trustway HSM: Data Security – Choosing the right path through compliance
Compliant, flexible and innovative, our range of hardware security modules provides companies and critical infrastructures with the reliability of an innovative and robust architecture that complies with strict security demands.