CipherStash: Selectively Encrypting Database Columns

An Intellyx Brain Candy Brief

CipherStash supplies a database proxy product called CipherStash Proxy that figures out what database columns to encrypt and then encrypts the columns. 

Applications access the database using the Proxy, which records what’s being accessed and by whom. he Proxy allows applications to perform plain text searches on the encrypted data.

CipherStash monitors database access and displays access pattern results on a dashboard so customers can select sensitive columns to encrypt. Database access patterns also provide audit and compliance capabilities.   

A second product called ZeroKMS automates frequent key rotation and enables record level encryption. If someone steals a key, access is limited to a single record.

CipherStash also records data access so that organizations can identify who accessed what during a breach. 

CipherStash currently supports Postgres compliant SQL databases and Amazon Dynamo. Support for other databases is in the works. 

The Proxy is deployed in a container in the customer environment.

Copyright © Intellyx BV. Intellyx is an industry analysis and advisory firm focused on enterprise digital transformation. Covering every angle of enterprise IT from mainframes to artificial intelligence, our broad focus across technologies allows business executives and IT professionals to connect the dots among disruptive trends. None of the organizations mentioned in this article is an Intellyx customer. No AI was used to produce this article. To be considered for a Brain Candy article, email us at pr@intellyx.com.

SHARE THIS: