The insurance industry manages risk, and recent insurance-company data breaches demonstrate cyber security is one of the biggest legal and regulatory risks. However, insurance providers must also reduce the risk of data breaches to retain customers, maintain profitability, and protect executive careers.

Insurance Data is a High-Value Target
Insurance companies are a very appealing target to hackers. According to the Pittsburgh Post Gazette: “The value of personal financial and health records is two or three times [the value of financial information alone], because there’s so many more opportunities for fraud,” said David Dimond, chief technology officer of EMC Healthcare, a Massachusetts-based technology provider. Combine a Social Security number, birth date and some health history, and a thief can open credit accounts plus bill insurers or the government for fictitious medical care, he noted.

Multiple Vulnerabilities
Insurance provider data vulnerabilities include:

  • Customer portals
  • Credit card transactions
  • Insider threats
  • External hackers (credential acquisition)
  • Big data warehousing and applications
  • Cloud data storage
  • Employees using content management solutions
  • The need to consolidate operations and data (e.g. acquisitions)

Advanced Threats and Outdated Protection
Today’s insurance companies frequently use outdated mix-and-match security solutions while cyber criminals attack them with the most advanced cyber weapons available. Insurance companies need to update their data security with an enterprise-level solution that not only meets the most challenging compliance constraints but also delivers true security from breach. They need a solution that works:

  • With all kinds of data
  • On multiple operating systems
  • In multiple environments
  • With limited human resources, funds, hardware and software.

An extensible infrastructure that delivers centralized key and policy management for a suite of data security solutions that secure your organization’s sensitive and regulated data wherever it resides. The result is low total cost of ownership, as well as simple, efficient deployment and operation.


Provides file and volume level data-at-rest encryption, secure key management and access controls required by regulation and compliance regimes.


Provides another level of protection from malicious insiders, privileged users, APTs and other attacks that compromise data by delivering the access pattern information that can identify an incident in progress.


Enables enterprises to easily build encryption capabilities into internal applications at the field and column level.


Enables centralized management of encryption keys for other environments and devices including KMIP compatible hardware, Oracle and SQL Server TDE master keys and digital certificates.


Lets administrators establish policies to return an entire field tokenized or dynamically mask parts of a field. With the solution’s format-preserving tokenization capabilities, administrators can restrict access to sensitive assets, yet at the same time, format the protected data in a way that enables many users to do their jobs.

Compliance

Dymar security solutions are designed to help you comply with:

  • Payment Card Industry Data Security Standard (PCI DSS)
  • State Data Breach Notification Laws
  • National Data Protection and Privacy Laws
  • Common Criteria
  • Others that will arise

Quick and Easy to Install No Matter what your OS

Dymar solutions work with most major operating systems, including Linux, UNIX and Windows servers in physical, virtual, cloud and big data Cardholder Data Environments (CDE).

Easy to Use

Dymar solutions makes it simple to address security and compliance concerns by simultaneously defending data in databases, files and Big Data nodes across public, private, hybrid clouds and traditional infrastructures. Central management of the entire data security platform makes it easy to extend data security protection and satisfy compliance requirements across the entire enterprise, growing as required, without adding new hardware or increasing operational burdens.

Doesn’t Slow System Performance

Transparent Encryption solution performs encryption and decryption operations at the optimal location of the files system or volume manager taking advantage of hardware cryptographic acceleration, such as Intel® Advanced Encryption Standard-New Instructions (Intel® AES-NI) and SPARC Niagara Crypto, to speed the encryption and decryption of data.

Achieving PCI DSS Compliance with Thales Data Protection

Consumers’ payment data continues to be a compelling target for criminals, and IT security defenses enacted to guard these assets continue to be circumvented. Virtually every major financial institution, retailer, and scores of payment processors have been the victims of devastating data breaches.

Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is critical for any business that stores, processes and transmits payment card information and the service providers that enable their businesses. This paper looks in detail at many of the vital PCI DSS 3.2.1 requirements set out for securing sensitive cardholder data, and reveals how the encryption, key management, and access control products from the Thales Data Protection portfolio address them to streamline your compliance needs.

Download