REAL-TIME DB/FILE
DATA ENCRYPTION


____


DATACRYPTO is a real-time unstructured data encryption/decryption technology that complies with the latest laws such as the Personal Information Protection Act.

It provides each business system with the most suitable method of encrypting unstructured data.

The first in Korea

The first product in Korea
to use the kernel method
(modification of applications not required)

The only in Korea

The only product in Korea to provide
kernel, agent, and API encryption methods

Complies with regulations

Complies 01

Protection of personal information

__

DATACRYPTO fully complies with the Personal Information Protection Act, Personal Information Safeguard and Security Standard, Personal Information Protection Guidelines (Ministry of the Interior and Safety), and other Korean laws.


Complies 02

Financial Supervisory Service's encryption measure guide

__

The access management provided by the log management system or recordings, videos, and images provided by a separate viewer are not considered encryption measures. Clients need to deploy a separate encryption measure.


Complies 03

EU's General Data Protection Regulation (GDPR)

__

The range of personal information and sensitive information set by the EU GDPR is much more comprehensive than in Korea. (Name, address, contact number, credit card number, IP address, location, genetic information, health-related information, and more)


Key Features

Encrypts unstructured data
in real time

DATACRYPTO encrypts/decrypts all targets (unique identification data, password, biometric data, etc.) subject to encryption by the Personal Information Protection Act as well as all unstructured data (recordings, videos, image files, log files, etc.) that contains personal information.


The only product in Korea to
provide all encryption methods

On top of adopting the kernel method encryption technology for the first time in Korea, DATACRYPTO also offers agent and API methods of encryption, allowing clients to select and apply the option that best suits their business situation.


Thorough 
encryption key management

Clients can set powerful security policies for all management processes via KEY MANAGER, a separate key management server. DATACRYPTO allows clients to create, distribute, discard, and perform other activities with password keys and link with the existing KMS.


Powerful
user permission management

Clients can combine various conditions such as OS account, process, IP address, and security account to restrict users' permissions to encrypt/decrypt data.
(Complies with Article 13 of Supervision of Electronic Financial Business)


Supports verified standard encryption algorithms

DATACRYPTO provides encryption algorithms verified by the National Intelligence Service and other domestic/international technology institutions and supports the use in various OS and applications.


Monitors and logs
audit data in real time

DATACRYPTO can collect and monitor all logs related to data subject to encryption such as file access (lookup, modification, addition, deletion), encryption/decryption, and policy configuration. Additionally, it also provides a feature that prevents counterfeiting/modification of audit logs.


Minimizes system load
and guarantees stability

DATACRYPTO uses minimum CPU in the existing environment when encrypting, meaning that clients need not place additional, separate systems. It also guarantees continuity in workflow and improvement in efficiency by supporting high-availability clustering for management servers.

REAL-TIME DB/FILE DATA ENCRYPTION

____

-DATACRYPTO is a real-time unstructured data encryption/decryption technology that complies with the latest laws
such as the Personal Information Protection Act. It provides each business system 
with the most suitable method of encrypting unstructured data.

 


          
The first in Korea

The first product in Korea to use the kernel method (modification of applications not required)




          
The only in Korea

The only product in Korea to provide kernel, agent, and API
encryption methods




Support Method

Select and Apply


Kernel

Layer

System Layer

Characteristics

·  Real-time encryption
·  Application modification not required

Applied System

·  Optimized for real-time large-sized system 
·  Suited for most systems 
(recording, image, EDMS, homepage, WAS,  logs, etc.)
Agent

Layer

Application Layer

Characteristics

·  Application modification not required
·  Can be applied to any OS

Applied System

·  Sequentially created files  such as logs, batches, images, and EDMS, or completed file system
API

Layer

Application Layer

Characteristics

·  Real-time encryption
·  Can be applied to any OS

Applied System

·  Optimized for business systems created for large-scale projects
·  System that allows application modification 
(DBMS, recording, etc.)
mobile background
Complies with regulations

We help our clients meet Korea's personal information security standards
that are being strengthened due to personal information leaks

Complies 01

Protection
of personal information

____

DATACRYPTO fully complies with the Personal Information Protection Act,
Personal Information Safeguard and Security Standard, Personal Information Protection Guidelines (Ministry of the Interior and Safety), and other Korean regulations.



Complies 02

Financial Supervisory Service's encryption measure guide

____

The access management provided by 
the log management system or recordings, videos, and images provided by a separate viewer are not 
considered encryption measures. 
Clients need to deploy a separate 
encryption measure.



Complies 03

EU's General Data Protection Regulation (GDPR)

____

The range of personal information and sensitive information set by the EU GDPR is much more comprehensive than
in Korea.
(Name, address, contact number, credit card number, IP address, location,
genetic information, health-related information, and more)



Key Features

Encrypts unstructured data in real time

DATACRYPTO encrypts/decrypts all targets (unique identification data, password, biometric data, etc.) subject to encryption by the Personal Information Protection Act as well as all unstructured data (recordings, videos, image files, log files, etc.) that contains personal information.

The only product in Korea to provide all encryption methods

On top of adopting the kernel method encryption technology for the first time in Korea, DATACRYPTO also offers agent and API methods of encryption, allowing clients to select and apply the option that best suits their business situation.

Thorough encryption key management

Clients can set powerful security policies for all management processes via KEY MANAGER, 
a separate key management server. DATACRYPTO allows clients to create, distribute, discard, 
and perform other activities with password keys and link with the existing KMS.

Powerful user permisson management

Clients can combine various conditions such as OS account, process, IP address, and security account 
to restrict users' permissions to encrypt/decrypt data. (Complies with Article 13 of Supervision of Electronic Financial Business)

Supports verified standard encryption algorithms

.DATACRYPTO provides encryption algorithms verified by the National Intelligence Service and 
other domestic/international technology institutions and supports the use in various OS and applications.

Monitors and logs audit data in real-time

-DATACRYPTO can collect and monitor all logs related to data subject to encryption such as file access (lookup, modification, addition, deletion), encryption/decryption, and policy configuration. Additionally, it also provides a feature that prevents counterfeiting/modification of audit logs.

Minimizes system load and guarantees stability

DATACRYPTO uses minimum CPU in the existing environment when encrypting, meaning that clients need not place additional, separate systems. It also guarantees continuity in workflow and improvement in efficiency by supporting high-availability clustering for management servers.

Supported Methods

Select and Apply



Kernel
Agent
API
Layer

System Layer


Application Layer
Application Layer
Charateristics

 · Raal-time encryption

 · Application modification
   not required


 · Application modification
   not required 

 · Can be applied to any OS

 · Real-time encryption

 · Can be applied to any OS


Appplied
System

 · Optimized for real-time
   large-sized system

 · Suited for most systems    (recording, image, EDMS, 
   homepage, WAS, logs, 
   etc.)


 · Sequentially created files 
   such as logs, batches, 
   images, and EDMS, or 
   completed file system 



 · Optimized for business 
   systems created for
   large-scale projects

 · System that allows 
   application modification 
   (DBMS, recording, etc.)


Related Products

Database Access Management

DBSAFER DB



System Access Management

DBSAFER AM



File/Process Access Management

DBSAFER OS


Integrated Account Management

DBSAFER IM



PNPSECURE | 107-86-44093

CEO Cheon-Oh, Park

Tel. 1670-9295 |E-mail sales@pnpsecure.com 

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of Korea (Magok-dong) 


Privacy Policy

Copyright ⓒ 2023 pnpsecure All rights reserved.


PNPSECURE | 107-86-44093

CEO Cheon-Oh, Park

Tel.   1670-9295          E-mail sales@pnpsecure.com

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of Korea (Magok-dong) 


Copyright ⓒ 2023 pnpsecure All rights reserved. |Privacy Policy