eperi Cloud Data Protection for Web Applications
Does your company use custom-developed web applications to meet your requirements? If so, how do you protect the data you keep in them? They might be more flexible, but they’re exposed to a higher risk of data protection violations. That’s because web apps often lack sufficient security against attackers. With eperi Cloud Data Protection for Web Applications, you can protect sensitive data in your own web applications against unauthorized access. The solution ensures that your information is encrypted or tokenized before it’s transferred to the application. That way, you have sole and centralized control over your data protection and compliance processes. The eperi Gateway’s unique, patented template architecture lets you choose whether to use the eperi standard algorithms for encryption or your own algorithms.
You can also decide for yourself which fields should be encrypted, tokenized or left as plain text – you’ll find that eperi gives you a perfectly tailored and scalable solution. The eperi Gateway has no footprint and only needs minimal changes to clients and servers. Key functionality like searching and sorting remain available and the biggest benefit is that it doesn’t hinder users in any way.
Functions of the eperi Gateway
The single most comprehensive Cloud Data Protection solution
As a customer, you alone control the encryption process.
On-premises, virtualized, containerized, in the cloud or hosted by partners.
Pseudonymization & Anonymization
Flexibility with encryption and tokenization.
Zero footprint requiring no change on Client- or Server-side needed.
Suitable for all cloud applications
Patented template concept supports key cloud applications.
Enterprise Grade Scalability
Stateless failover / load balanced, worldwide deployments, georedundant.
Crypto-agility while maintaining all key cloud functionality.
Single Point of Control
Centralized enforcement of compliance policies and regulatory requirements.
You as the customer determine which data is encrypted, tokenized or left unchanged.
No access by third parties via hidden back doors.