¡Solusoft Transforms You!

Leading company in technology services and applications consulting, with more than 30 years making history in the Panamanian market.

With more than 25 years representing the best database and technology manufacturer in the world, Oracle, as a Platinum Partner.

icon_widget_image Mon - Fri: 8am a 5pm icon_widget_image P.H. Gran Plaza, calle 77 Este, San Francisco, Piso 3, Oficina 3A, Ciudad de Panamá. icon_widget_image + (507) 232-9222 + (507) 6204-3767 icon_widget_image ventas@solusoft.com mercadeo@solusoft.com

cifrado 1 Protección de datos confidenciales Cifrado de base de datos de Oracle:

We encrypt the data in Oracle database columns without the need to handle encryption keys. This allows you to protect applications without making any changes to the application code. Additionally, we use industry standard encryption including AES and 3DES.

oracle solusoft 1

Transport your data
in a safe way

solusoft cifrado img02

Transparent data encryption allows you to encrypt sensitive data. Encrypted data is decrypted transparently to an application or database user that has access to the data, helping to protect data stored on media in the event of theft of storage media or data files. Oracle uses authentication, authorization, and auditing mechanisms to protect database data but not the operating system data files where data is stored. To protect these data files, Oracle provides encrypted sensitive data stored in the data files. To prevent unauthorized decryption, TDE stores encryption keys in a security module external to the database.

Advantages of using transparent data encryption

tab2 8As a security administrator, you will have peace of mind that sensitive data is protected in the event of theft of storage media or data files.

tab2 8Implementing TDE helps address security-related regulatory compliance issues.

tab2 8You don’t need to create triggers or views to decrypt the data for an authorized user or application. The data in the tables is decrypted transparently to the application and the database user.

tab2 8Database applications and users do not need to know that the data they are accessing is stored in encrypted mode. Data is decrypted transparently to applications and database users.

tab2 8There is no need to modify applications to control encrypted data. The database manages the encryption and decryption of data.

tab2 8Key management operations are automated. The user or the application does not need to manage the encryption keys.

Stories Success



f2 7

Download a Data Encryption brochure