Data protection with the eperi Gateway – secure, simple and flexible
The eperi Gateway is the foundation for all eperi cloud data protection solutions. It acts as an invisible protective shield and runs independently of the applications you want to protect – whether they’re on-premises, in the cloud or hosted by a partner. As it’s a network component, the eperi Gateway doesn’t need any time-consuming installation on the client or server side and it comes with all key functionalities like searching and sorting. It’s usually used as a transparent proxy and works with all common cloud services, database applications and file storage systems.
Your sensitive information only leaves your company in encrypted form. The eperi solutions provide what’s known as crypto-agility, enabling you to decide for yourself which algorithms are best suited to your requirements – standard algorithms like AES-256 and RSA-2048, post-quantum algorithms, or your own algorithms. The eperi Gateway’s patented template architecture controls which data fields are encrypted, tokenized or left as plain text. That makes it much easier for you to comply with stringent data protection regulations around the world. You’re always in control.
The eperi Gateway is based on the open-source component secRT (Security Runtime). It was developed together with Germany’s Federal Office for Information Security (BSI), which also tested it.
The benefits of the eperi Gateway
As a customer, you alone control the encryption process.
On-premises, virtualized, containerized, in the cloud or hosted by partners.
Pseudonymization & Anonymization
Flexibility with encryption and tokenization.
Zero footprint requiring no change on Client- or Server-side needed.
Suitable for all cloud applications
Patented template concept supports key cloud applications.
Enterprise Grade Scalability
Stateless failover / load balanced, worldwide deployments, georedundant.
Crypto-agility while maintaining all key cloud functionalities.
Single Point of Control
Centralized enforcement of compliance policies and regulatory requirements.
You as the customer determine which data is encrypted, tokenized or left unchanged.
No access by third parties via hidden back doors.