breadcrumb

Data protection with the eperi Gateway – secure, simple and flexible

The eperi Gateway is the foundation for all eperi cloud data protection solutions. It acts as an invisible protective shield and runs independently of the applications you want to protect – whether they’re on-premises, in the cloud or hosted by a partner. As it’s a network component, the eperi Gateway doesn’t need any time-consuming installation on the client or server side and it comes with all key functionalities like searching and sorting. It’s usually used as a transparent proxy and works with all common cloud services, database applications and file storage systems.

Your sensitive information only leaves your company in encrypted form. The eperi solutions provide what’s known as crypto-agility, enabling you to decide for yourself which algorithms are best suited to your requirements – standard algorithms like AES-256 and RSA-2048, post-quantum algorithms, or your own algorithms. The eperi Gateway’s patented template architecture controls which data fields are encrypted, tokenized or left as plain text. That makes it much easier for you to comply with stringent data protection regulations around the world. You’re always in control.

The eperi Gateway is based on the open-source component secRT (Security Runtime). It was developed together with Germany’s Federal Office for Information Security (BSI), which also tested it.

The benefits of the eperi Gateway

Full Control

As a customer, you alone control the encryption process.

Flexibile Deployment

On-premises, virtualized, containerized, in the cloud or hosted by partners.

Pseudonymization & Anonymization

Flexibility with encryption and tokenization.

Quick Success

Zero footprint requiring no change on Client- or Server-side needed.

Suitable for all cloud applications

Patented template concept supports key cloud applications.

Enterprise Grade Scalability

Stateless failover / load balanced, worldwide deployments, georedundant.

Highest Security

Crypto-agility while maintaining all key cloud functionalities.

Single Point of Control

Centralized enforcement of compliance policies and regulatory requirements.

Flexible configuration

You as the customer determine which data is encrypted, tokenized or left unchanged.

European Company

No access by third parties via hidden back doors.