Atakama's Application Level Database Encryption (ALE solution offers robust protection for sensitive data by encrypting information both at rest and during transmission. Unlike traditional Transparent Database Encryption (TDE systems that grant broad access upon user authentication, Atakama ensures that sensitive data remains encrypted until a specific access request is made. This approach maintains data confidentiality by decrypting information only within the application, ensuring that data on the server remains encrypted at all times.
Key Features and Functionality:
- Application-Level Encryption: Data is encrypted within the application as it is entered, ensuring that sensitive information is protected before transmission to the database.
- User-Specific Decryption: Data is decrypted within the application only when a user explicitly requests access, maintaining strict control over sensitive information.
- Multi-Factor Authentication: Access requests trigger a notification to the user's smartphone via the Atakama Mobile app. Approval on the mobile device sends a key fragment back to the workstation, enabling decryption.
- Seamless Integration: Atakama's ALE can function as a transparent ODBC or REST proxy on the user's endpoint, making it suitable for legacy applications or systems without accessible source code.
Primary Value and Problem Solved:
Atakama's ALE solution addresses the critical need for securing sensitive database information by implementing encryption at the application level. This method ensures that data remains encrypted on the server and is only decrypted within the application upon user authorization. By decoupling data access from traditional identity and access management systems, Atakama reduces the risk of unauthorized access and data breaches, providing organizations with a robust and user-friendly approach to database security.