Would you like to be called free of charge by one of our advisors?

Our advisors are available from Monday to Friday at 9am to 12am and at 2pm to 6pm

Thank you, our adivisors will calling you.

NETLIB Encryptionizer

Protect, Manage & Defend Your Data

Request documentation Contact-us

Simplifying the protection of your digital world

NetLib Security’s high performance data security platform, Encryptionizer, delivers the highest level of protection for your most important asset: data. It transparently encrypts your data across physical, virtual and cloud environments while maintaining business stability with virtually no impact on performance.

Our patented technology advances the state of the art of your data security, without increasing your budget – no administrative overhead, new hardware or programming required.

Functions

Encryption of complete databases

Column/data encryption

Encryption of flat files (Word, PDF etc.)

Key features

  • Fast and easy to implement
  • Encryption algorithms based on industry standards
  • Allows the segregation of roles
  • Cluster-compatible multiprocessors
  • No administration

NetLib Encryptionizer is a set of innovative and powerful solutions for encrypting SQL (Oracle, SQL, MySQL, DB2 UDB,…) or non-SQL (M.S Access, Borland, C.A, ect.) files or databases.

These solutions can be integrated into all types of applications, including external software packages, to add an additional layer of security independent of the system, application, or database security used. It is therefore not necessary to acquire expensive database extensions such as SQL Enterprise or Vault for Oracle. NetLib® Encryptionizer® can be deployed without programming and without cumbersome administration, which is generally highly appreciated by database administrators and security officers already under heavy pressure.

Data protection is therefore ensured at all levels of the company, from the central server to workstations or laptops.For example, a mobile sales force can use database extractions on laptops that will then be synchronized with the entire database stored on the central server. Encrypted databases can be distributed securely on CD/DVD, USB key, or via the Internet.

Product Datasheets

We remain at your disposal for more information

Request documentation Contact-us