DATAKEEP

Manage who, what, when, where and how data is accessed.

Control Data Access Anywhere

DataKeep™ Diagram

Implementing a “protect everything” approach to data security has never been easier. With DataKeeps’s easy to use virtual management console, agents are easily deployed and managed locally, remotely or in the cloud providing a holistic view of your data protection and complete control of data access.

Control and Manage Data Protection

Privileged Access Management Green 118px

Cloud Privacy with Privileged Access Management

With DataKeep’s privileged access management feature, you can rest assured your data is completely private in any cloud environment. Implementing restrictions on cloud vendor administrators and root users means they never have access to your data and you are in complete control of your cloud security and privacy.

role based green 104px

Role-Based Data Access Controls

Role-based, least privileged access and privileged user (root/admin) controls, coupled with fine-grained policy options, puts you in charge of who can access your data. With robust and flexible access control settings, policies can be defined at the file or volume level. Cryptographic separation at the file level provides an extra layer of protection and supports secure multi-tenant storage environments.

103px Green

Integrated and Transparent Key Management

Integrated, transparent key management provides simplified but robust features for your keys including key rotation that conforms to industry compliance requirements and key revocation for data destruction. Additionally, software-defined keys embedded within the data itself eliminates the need for costly external hardware bulk key stores, and makes managing your keys far less cumbersome.

Clipboard Green 100px transparent

Compliance and Audit Readiness

Be compliance and audit ready with DataKeep. Real time logging ensures all notices are properly logged and forwarded. Based on policy definitions, the reliable eventing feature captures, flags, and forwards specified or all data accessed – seamlessly integrating with existing SIEMs.

Scalable Green 80px

End-to-End Integration Management

A centralized management console provides a single vantage point to deploy, monitor and update data protection across your enterprise. Easily define and manage policies, initialize and update provisioning of encryption agents, manage data and system life cycles, aggregate policy logs and manage keys — all in one place.

Policy green 80px

Advanced Encryption

Combining AES-256 encryption and our patented FIPS 140-2 certified cryptographic splitting technology, DataKeep delivers advanced, provably secure data protection no matter where data resides (local, remote, hybrid or cloud). With performance that can be as fast as clear text, you are able to encrypt your data with negligible operational impact.

White DataKeep 355

Learn more about our solution by watching this video.

We have the perfect fit for your data challenges.

Across all industries and independent of organizational size, DataKeep can meet your specific protection requirements for on-premises and cloud-based storage.

Cloud Confidence Green 205px

Cloud Confidence

Embrace the benefits offered by cloud service providers, but use DataKeep policies to maintain total control. Encrypt data before you upload and store decryption keys within your private network.

Clipboard Green 73px

Compliance

Industry and governmental compliance mandates that define data protection practices are constantly being updated or newly created. The majority specify data breach reporting requirements, but exempt data collectors and processors whenever lost data is encrypted—GDPR included.

SupplyChain Green 100px

Supply Chain

DataKeep allows you to restrict suppliers to specific system functions and give access permissions to only specified data, providing visibility management, control and security in a multi-supplier access environment across your supply chain.

Disclaimer: Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Copyright © 2017 Security First Corp.     Terms of Use     Privacy Policy     Support Desk