Cloud Database

Database-architecture-diagram-1How It Works

OXE Master for Databases enables you to encrypt any database field without changing the underlying application code or database schema. The solution integrates with the driver on the application server, allowing it to inspect content and apply appropriate cryptographic operations locally before forwarding requests to the database. Since the data flow remains the same as the original application flow, the performance overhead is low.

Configuration policies and encryption keys are centrally managed on the OXE Master Server. When the application server needs to access a database, the application driver automatically loads policies and keys from the OXE Master Server. Upon successful authentication, the policies and keys are sent to the client, which can independently encrypt, or decrypt data without further interaction with the OXE Master Server, although the encryption keys never persist on the client disk.

Most trusted and secure cloud databaseCloud computing concept

OXE Master supports a wide array of encryption options that can be applied on a field-by-field basis, letting you maximize security, while maintaining the format and function of the data. Specialized encryption options support dates, phone numbers, currency formats, timestamps, email addresses, or structured number strings such as credit cards or social security numbers.

OXE Master uses AES 256-bit encryption, and robust key management to ensure that no third-parties or unauthorized database administrators can access protected data. This allows organizations to segregate security and database management duties – recommended best practices for compliance. The solution is more secure, higher-performance and easier to manage than conventional file-system encryption or Transparent Data Encryption (TDE).

Precise Encryption For Records In Any Cloud Or On-Premise Database

OXE Master for Databases provides a robust solution for encrypting specific fields in a database, while restricting access to the critical encryption keys. The solution enables organizations to protect information in any Java-compliant database while maintaining querying, reporting, and other key functions. This eliminates the costs and complexity of modifying existing applications or developing custom code.

Protects:cloud-computing-power

Any JDBC-compliant database
Public cloud databases
Private cloud databases
On-premise databases

Capabilities:

AES 256 encryption
Key management
Field-level protection
Format and function preserving
Multiple database support