Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Aptible provides a seamless solution to implement the essential security measures required for regulatory compliance and customer audits. With its Aptible Deploy feature, you can effortlessly maintain adherence to compliance standards while fulfilling customer audit expectations. The platform ensures that your databases, traffic, and certificates are securely encrypted, meeting all necessary encryption mandates. Data is automatically backed up every 24 hours, and you have the flexibility to initiate a manual backup whenever needed, with a straightforward restoration process that takes just a few clicks. Moreover, comprehensive logs for every deployment, configuration alteration, database tunnel, console operation, and session are generated and preserved. Aptible continuously monitors the EC2 instances within your stacks, looking out for potential security threats such as unauthorized SSH access, rootkit infections, file integrity issues, and privilege escalation attempts. Additionally, the dedicated Aptible Security Team is available around the clock to promptly investigate and address any security incidents that may arise, ensuring your systems remain safeguarded. This proactive approach allows you to focus on your core business while leaving security in expert hands.

Description

The Vormetric Data Security Platform simplifies the management of data-at-rest security throughout your organization, enhancing efficiency. It is constructed on a flexible framework, offering a variety of data security products that can function independently or together to provide sophisticated encryption, tokenization, and centralized key management. This robust security solution equips your organization to tackle emerging security threats and meet evolving compliance standards while minimizing total cost of ownership. As a unified data security platform, the Vormetric Data Security Platform ensures comprehensive data protection can be managed from a central point, streamlining your security efforts across multiple facets. By adopting this platform, organizations can fortify their defenses against data breaches and safeguard sensitive information more effectively.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Docker
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Jellyfish
SAP Store
Scuba Database Vulnerability Scanner
Slack

Integrations

Amazon Web Services (AWS)
Docker
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Jellyfish
SAP Store
Scuba Database Vulnerability Scanner
Slack

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Aptible

Founded

2013

Country

United States

Website

www.aptible.com

Vendor Details

Company Name

Thales e-Security

Founded

1983

Country

France

Website

cpl.thalesgroup.com/en-gb/node/388

Product Features

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

HIPAA Compliance

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

Product Features

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Alternatives

Alternatives

Portworx Reviews

Portworx

Pure Storage
EncryptRIGHT Reviews

EncryptRIGHT

Prime Factors
Runecast  Reviews

Runecast

Runecast Solutions