Filesystem Encryption

Download Solution Brief

Request a Demo

file encryption hero

Keep individual files and folders safe

Every day, the news is filled with reports about new data breaches that have led to loss of customer trust, legal consequences, and financial setbacks. Organizations are always looking to bolster the security of their business-critical data. Full disk encryption is no longer deemed as a sufficient practice, and both technology and business leaders want to ensure that individual files or folders, installed on various filesystems, can be accessed only by authorized and privileged users. Filesystem encryption is a proven approach that not only adds an additional level of data security, but also for separation of duties between data owners and system administrators.

The biggest challenge that organizations face when choosing to encrypt individual filesystems is management of the encryption keys. With each filesystem having its own encryption key, key sprawl becomes a reality and can easily get out of hand. How those keys are stored is of paramount importance as well-- encryption keys are attractive targets for hackers. Poorly managed and stored keys increase cyber vulnerabilities and exacerbates the data security challenges organizations face.

Key Benefits

Uplevel data security

Easily Deploy at Scale

Seamlessly set up and manage agents, based on Open Policy Agent specification with no kernel dependencies, to encrypt individual filesystems mounted on host machines. Scale across physical or virtual servers, compatible with Windows, Linux, and Unix platforms, without disrupting workflow.
Control access policies

Prevent Malicious Threats

Enjoy peace of mind with file-level encryption that continuously protects against unauthorized access in physical, virtual, and cloud environments. Apply granular encryption policies to ensure only authorized users and processes can access sensitive data in plain text.
Manage key efficiently

Manage Key Efficiently

Centralize lifecycle management of all encryption keys and apply policies from single pane of glass. Store keys in natively integrated FIPS-140-2 Level 3 HSM, available as SaaS or on-premises. Prevent involuntary or malicious key deletion with Quorum Approvals.

Relentless encryption practice

Solution

Fortanix Filesystem Encryption allows you to go beyond full disk encryption and protect individual filesystems mounted on a specified host. You now can apply fine-grained access controls and manage encryption keys efficiently at scale to better defend against malicious actors and maintain regulatory compliance.

The Fortanix Difference

image

Unified data security platform that secures data across hybrid multicloud environments.

image

Natively integrated FIPS 140-2 Level 3 HSM, available as SaaS or on-premises.

fileEncryption

Key Features

  • Scalable agent deployments, based on Open Policy Agent specification, with no kernel dependencies
  • Support for Linux, Microsoft Server, and Microsoft OS.
  • Central control of and visibility into key management operations with enterprise level access controls and single sign-on support.
  • Full key lifecycle management to generate, rotate, and delete encryption keys and adhere to security best practices.
  • Quorum Approvals provide added security measures to prevent accidental key deletion or unauthorized filesystem mounts.
  • Secure key store in FIPS 140-2 Level 3 HSM, available as SaaS or on-premises.
  • Fine-grain policy-driven access controls restrict access to plain text data solely to authorized users and processes.
  • Audit logs for both key management and policy enforcement.

About Fortanix

Fortanix is a global leader in data security. We prioritize data exposure management, as traditional perimeter-defense measures leave your data vulnerable to malicious threats in hybrid multicloud environments. Our unified data security platform makes it simple to discover, assess, and remediate data exposure risks, whether it’s to enable a Zero Trust enterprise or to prepare for the post-quantum computing era. We empower enterprises worldwide to maintain the privacy and compliance of their most sensitive and regulated data, wherever it may be.For more information, visit https://www.fortanix.com.

Banner Background

Ready to Test Fortanix Runtime Encryption?

request a demo
dsm laptop Image
Fortanix-logo

4.6

star-ratingsgartner-logo

As of August 2023

SOC-2 Type-2ISO 27001FIPSGartner LogoPCI DSS Compliant

US

Europe

India

Singapore

3910 Freedom Circle, Suite 104,
Santa Clara CA 95054

+1 408-214 - 4760|info@fortanix.com

High Tech Campus 5,
5656 AE Eindhoven, The Netherlands

+31850608282

UrbanVault 460,First Floor,C S TOWERS,17th Cross Rd, 4th Sector,HSR Layout, Bengaluru,Karnataka 560102

+91 080-41749241

T30 Cecil St. #19-08 Prudential Tower,Singapore 049712