We’re All in the Data Security Business

Default Blog Top Image
by Christina Polaski Posted on June 20, 2014

Imagine having to contact 10 million customers to apologize because their social security and credit card numbers were compromised due to a stolen company laptop? Then imagine all of the associated financial and legal repercussions you'd have to deal with, and beyond that, how your brand would suffer from a damaged reputation and a future lack of customer trust. However, this potential crisis could be avoided by investing in software that helps protect your data.

According to the 2013 Manufacturing and Distribution monitor report from consulting firm, McGladrey, which surveyed 1,067 industry executives across the United States, an overwhelming 68% of executives felt their data was at little or no risk. Scary, huh?

Data is always at risk. Whether it’s a professional hacker or a disgruntled employee, it is in an organization’s best interest to protect sensitive data.

With Progress OpenEdge Transparent Data Encryption (TDE), you can do just that. It protects your “data-at-rest” while using standard encryption libraries and encryption key management. The best part is you can use TDE without changing ABL or SQL code, database design and management, or user procedures.

TDE also has less than 2% of a performance impact and is completely automated. It provides protection on disk, in backups, and binary dump files. You simply set it and forget it, knowing that your data is securely protected.

Learn more about the importance of protecting your data and how OpenEdge TDE can help from our Transparent Data Encryption Resource Center.


Christina Polaski
View all posts from Christina Polaski on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.
More from the author

Related Tags

Related Articles

Progress DataDirect Now Connects to Denodo
Progress DataDirect has added Denodo, a data virtualization software platform, to its catalog of connectors.
What Is the Difference Between SSO, 2FA and MFA?
Learn about the three main security protocols and their differences: Single Sign-On (SSO), Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA).
The Key Benefits of CI/CD - Continuous Integration and Delivery
Learn about the ways Progress Professional Services deploys CI/CD to help OpenEdge customers and how they can help your organization.
Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation