Independent Software Vendor

THALES DIS CPL USA, INC

Securing the World's Most Sensitive Data for Over 40 Years 

The people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced with an increasing number of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting compliance mandates, you can rely on Thales to secure
your digital transformation.

Benefits of Partnership

Thales provides critical data security capabilities for Teradata including integrated encryption, key management, and auditing. Customers can extend our proven Vormetric platform for protecting structured and unstructured data to their Teradata deployments. These capabilities complement Teradata environments to provide the most secure, robust, flexible, and comprehensive data security solution available.

CipherTrust Protection for Teradata Database

CipherTrustProtection for Teradata Database simplifies the process of employing column-level encryption in your Teradata database. The product reduces complexity for developers by offering documented, standards-based application programming interfaces (APIs) and user-defined functions (UDFs) that can be used to perform cryptographic and key management operations.

Product Interoperability

Version Teradata(s)
6.1.3 Vantage AdvSQL 16.20
TD 16.10
TD 15.10
6.0.2 TD 16.20
TD 16.10
TD 15.10
5.2.4 TD 16.20
TD 16.10
TD 15.10

CipherTrust Transparent Encryption

CipherTrust Transparent Encryption for Teradata Database simplifies the process of securing sensitive records, with block-level database encryption backed by centralized key management, privileged user access controls and detailed data access audit logging.

Product Resources

Product Interoperability

Version Teradata(s)
7.0.0.103 Vantage AdvSQL 17.00
Vantage AdvSQL 16.20
6.1.3 Vantage AdvSQL 16.20

About Thales e-Security

The CipherTrust Data Security Platform from Thales removes complexity from data security, accelerates time to compliance, and secures cloud migrations. The platform is designed for the cloud, unifying data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in fewer resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced business risk.