News

Porticor's software-defined key management solution eliminates risks surrounding storing SQL Database Encryption Keys (DEK) on the database server, where they can be compromised or stolen.
SQL Server, a database management system, can be a treasure trove for attackers if not properly secured. Encryption is a powerful tool in your cybersecurity arsenal, allowing you to protect data ...
This post will explore how this was done, look at how SQL Server encryption works, introduce some new methods of brute-forcing database encryption keys, and show a mistake in ManageEngine’s ...
With SQL Server 2005, there are functions and methods provided for data encryption and decryption. These methods were not provided with the earlier version i.e. SQL Server 2000, where you had to ...
This step-by-step article lists the steps that you must use to enable Secure Socket Layer (SSL) encryption for Microsoft SQL Server 2000 if you have a valid Certificate Server in your network ...
TDE does real-time I/O encryption and decryption of data and log files. The encryption uses a database encryption key (DEK). The database boot record stores the key for availability during recovery.
Storing the data encryption keys in Porticor’s key management service, Porticor’s MS SQL Server plugin is a small installable package that can be added to a running SQL Server database with ...
"Since SQL servers often hold an organization's most important information, they are a favorite target for attacks," said Gilad Parann-Nissany, Porticor founder and CEO. "Microsoft's Transparent Data ...