www.microfocus.com Open in urlscan Pro
2.16.186.176  Public Scan

Submitted URL: http://www.voltage.com/
Effective URL: https://www.microfocus.com/en-us/cyberres/data-privacy-protection
Submission: On November 04 via api from DE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to Main Content Skip to Footer


YOUR BROWSER IS NOT SUPPORTED

For the best experience, use Google Chrome or Mozilla Firefox.




 * Podcast
 * Academy
 * Community
 * Blog
 * Contact

×
 * Solutions
    * Business Outcomes
       * Secure Cloud
         
         
      
       * Secure Customer Identities
         
         
      
       * Secure Data
         
         
      
       * Secure Digital Transformation
         
         
      
       * Secure the Enterprise
         
         
      
       * Secure the Value Chain
         
         
      
       * Secure Third-Party Risk
         
         
   
    * Industry Solutions
       * Energy
         
         
      
       * Financial Services
         
         
      
       * Healthcare
         
         
      
       * Public Sector and Government Services
         
         
      
       * Telecommunications
         
         
      
       * Transportation
         
         
   
    * Partner Solutions
       * Cyber Resiliency Maturity Assessment
         
         
      
       * Data Security and Privacy Assessment
         
         
      
       * Managed Application Security
         
         
      
       * Managed Data Security and Privacy
         
         
      
       * Managed Detect and Response
         
         
      
       * Managed Identity, Access, and Governance
         
         
      
       * Managed Threat Hunting
         
         
      
       * Secure Development
         
         
      
       * Secure Digital Transformation Assessment
         
         
      
       * Secure Journey to Cloud
         
         
   
    * SaaS Services
       * Application Security as a Service
         
         
      
       * Data Security as a Service
         
         
      
       * Identity as a Service
         
         
      
       * SecOps as a Service
         
         
   
    * Technology Outcomes
       * Advanced Threat Detection and Response
         
         
      
       * Breach Assessment
         
         
      
       * Data, Access, and Identity Governance
         
         
      
       * Next-Generation Security Operations
         
         
      
       * Privacy and Compliance
         
         
      
       * Secure Development and Testing
         
         
      
       * Zero Trust
         
         

 * Products
    * Application Security
      
       * FORTIFY
         
         Application Security
         
         Build secure software fast with an application security platform that
         automates testing throughout the CI/CD pipeline to enable developers to
         quickly resolve issues.
         
         Use Cases
          * Developer-Driven Security
            
            
         
          * DevSecOps
            
            
         
          * Enterprise DAST
            
            
         
          * Integrating Security into the CI/CD Pipeline
            
            
         
          * Reducing Software Risk
            
            
         
          * Scale Secure Software
            
            
      
       * 
       * 
         Fortify on Demand
         
         
      
       * 
         Integration Ecosystem
         
         
      
       * 
         Marketplace
         
         
      
       * 
         Software Composition Analysis
         
         
      
       * 
         Software Security Center
         
         
      
       * 
         Static Code Analyzer
         
         
      
       * 
         WebInspect
         
         
   
    * Artificial Intelligence
      
       * INTERSET
         
         Artificial Intelligence
         
         Interset augments human intelligence with machine intelligence to
         strengthen your cyber resilience.
      
       * Interset
         
         
   
    * Data Privacy and Protection
      
       * VOLTAGE
         
         Data Privacy and Protection
         
         Discover, analyze, and protect sensitive structured and unstructured
         data, reduce breach risk, and enable data usability with privacy across
         hybrid IT.
         
         Use Cases
          * Acceleration to the Cloud
            
            
         
          * Data Privacy and Regulatory Pressures
            
            
         
          * IT Modernization
            
            
      
       * 
       * Unstructured Data
         File Analysis Suite
          * File Analysis Suite
            
          * Data Access
            
            
         
          * Data Discovery
            
            
         
          * Data Management
            
            
      
       * 
         SecureMail
         
         
      
       * 
         SmartCipher
         
         
      
       * Structured Data
         SecureData Enterprise
          * SecureData Enterprise
            
          * Big Data
            
            
         
          * Cloud
            
            
         
          * Payments
            
            
         
          * Sentry
            
            
      
       * 
         Structured Data Manager
         
         
   
    * Identity and Access Management
      
       * NETIQ
         
         Identity and Access Management
         
         Our adaptive identity-centric expertise gives you an integrated
         platform for identity, access, and privilege management that drives
         your modern IT ecosystem.
         
         Use Cases
          * Access and Advanced Authentication
            
            
         
          * Identity Goverance
            
            
         
          * Least Privilege Access
            
            
         
          * Policy Unification
            
            
      
       * 
       * Access Management
          * Access Management
            
          * Access Manager
            
            
         
          * Advanced Authentication
            
            
         
          * Risk Service
            
            
         
          * Secure API Manager
            
            
         
          * SecureLogin
            
            
         
          * Self Service Password Reset
            
            
      
       * Identity Governance and Administration
          * Identity Governance and Adminstration
            
          * Data Access Governance
            
            
         
          * Identity Governance
            
            
         
          * Identity Manager
            
            
      
       * Privilege Management
          * Privilege Management
            
          * AD Bridge
            
            
         
          * Directory and Resource Administrator
            
            
         
          * Privileged Account Manager
            
            
      
       * Delegated Administration
          * Delegated Administration
            
          * Change Guardian
            
            
         
          * Directory and Resource Administrator
            
            
         
          * Group Policy Administrator
            
            
         
          * Policy Compliance Assessor
            
            
         
          * Secure Configuration Manager
            
            
         
          * Security Solutions for IBM i
            
            
         
          * Universal Policy Administrator
            
            
   
    * Security Operations
      
       * ARCSIGHT
         
         Security Operations
         
         A security analytics-powered resilient SOC that intelligently adapts to
         talent shortages by sharpening resource focus with faster, more
         accurate threat detection of both known and unknown threats.
         
         Use Cases
          * Exposure Time Reduction
            
            
         
          * Operational Efficiency
            
            
         
          * People-Centric Attack Mitigation
            
            
         
          * Pre-emptive Threat Detection
            
            
         
          * SecOps Compliance
            
            
      
       * 
       * 
         Enterprise Security Manager
         
         
      
       * 
         Intelligence
         
         
      
       * 
         Marketplace
         
         
      
       * 
         MITRE ATT&CK Framework
         
         
      
       * 
         Recon
         
         
      
       * 
         Security Open Data Platform
         
         
      
       * 
         Security Orchestration Automation and Response
         
         
      
       * 
         Sentinel
         
         
   
    * 
    * 
      Products A-Z
    * 
      Documentation

 * Resources
    * 
      Resource Library
   
    * 
    * 
      Article
    * 
      Brochure
    * 
      Case Study
    * 
      Data Sheet
    * 
      eBook
    * 
      Video
    * 
      Webinar
    * 
      White Paper

 * Partners
    * 
      Partner with CyberRes
   
    * 
    * 
      Partner Locator
    * 
      Partner Portal Login
    * Partner Solutions
       * Cyber Resiliency Maturity Assessment
         
         
      
       * Data Security and Privacy Assessment
         
         
      
       * Managed Application Security
         
         
      
       * Managed Data Security and Privacy
         
         
      
       * Managed Detect and Response
         
         
      
       * Managed Identity, Access, and Governance
         
         
      
       * Managed Threat Hunting
         
         
      
       * Secure Development
         
         
      
       * Secure Digital Transformation Assessment
         
         
      
       * Secure Journey to Cloud
         
         
   
    * 
      Partnership Benefits
    * 
      Partnership Opportunities
    * Strategic Alliances
       * Accenture
         
         
      
       * Capgemini
         
         
      
       * Cognizant
         
         
      
       * CrowdStrike
         
         
      
       * Deloitte
         
         
      
       * DXC
         
         
      
       * PwC
         
         
      
       * Snowflake
         
         
      
       * Tata Consultancy Services
         
         

 * Customer Success
    * 
      Free Trials
    * 
      Community
    * 
      Professional Services
    * 
      Success Stories
    * 
      Support
    * 
      Training
    * 
      User Groups

 * About CyberRes
    * 
      About
    * 
      Blog
    * 
      Careers
    * 
      Contact Us
    * 
      Events
    * 
      Press Room



‹
 * Solutions
   
   Solutions
   
    * Business Outcomes
      
      Business Outcomes
      
       * Secure Cloud
       * Secure Customer Identities
       * Secure Data
       * Secure Digital Transformation
       * Secure the Enterprise
       * Secure the Value Chain
       * Secure Third-Party Risk
   
    * Industry Solutions
      
      Industry Solutions
      
       * Energy
       * Financial Services
       * Healthcare
       * Public Sector and Government Services
       * Telecommunications
       * Transportation
   
    * Partner Solutions
      
      Partner Solutions
      
       * Cyber Resiliency Maturity Assessment
       * Data Security and Privacy Assessment
       * Managed Application Security
       * Managed Data Security and Privacy
       * Managed Detect and Response
       * Managed Identity, Access, and Governance
       * Managed Threat Hunting
       * Secure Development
       * Secure Digital Transformation Assessment
       * Secure Journey to Cloud
   
    * SaaS Services
      
      SaaS Services
      
       * Application Security as a Service
       * Data Security as a Service
       * Identity as a Service
       * SecOps as a Service
   
    * Technology Outcomes
      
      Technology Outcomes
      
       * Advanced Threat Detection and Response
       * Breach Assessment
       * Data, Access, and Identity Governance
       * Next-Generation Security Operations
       * Privacy and Compliance
       * Secure Development and Testing
       * Zero Trust

 * Products
   
   Products
   
    * Application Security
      
      Application Security
      
       * FORTIFY
         
         Application Security
         
         Build secure software fast with an application security platform that
         automates testing throughout the CI/CD pipeline to enable developers to
         quickly resolve issues.
         
         Use Cases
         
            FORTIFY
            
            Application Security
            
            Use Cases
         
          * Developer-Driven Security
          * DevSecOps
          * Enterprise DAST
          * Integrating Security into the CI/CD Pipeline
          * Reducing Software Risk
          * Scale Secure Software
      
       * 
       * 
         Fortify on Demand
       * 
         Integration Ecosystem
       * 
         Marketplace
       * 
         Software Composition Analysis
       * 
         Software Security Center
       * 
         Static Code Analyzer
       * 
         WebInspect
   
    * Artificial Intelligence
      
      Artificial Intelligence
      
       * INTERSET
         
         Artificial Intelligence
         
         Interset augments human intelligence with machine intelligence to
         strengthen your cyber resilience.
      
       * Interset
   
    * Data Privacy and Protection
      
      Data Privacy and Protection
      
       * VOLTAGE
         
         Data Privacy and Protection
         
         Discover, analyze, and protect sensitive structured and unstructured
         data, reduce breach risk, and enable data usability with privacy across
         hybrid IT.
         
         Use Cases
         
            VOLTAGE
            
            Data Privacy and Protection
            
            Use Cases
         
          * Acceleration to the Cloud
          * Data Privacy and Regulatory Pressures
          * IT Modernization
      
       * 
       * Unstructured Data
         File Analysis Suite
            Unstructured Data
            
            File Analysis Suite
         
          * File Analysis Suite
            
          * Data Access
          * Data Discovery
          * Data Management
      
       * 
         SecureMail
       * 
         SmartCipher
       * Structured Data
         SecureData Enterprise
            Structured Data
            
            SecureData Enterprise
         
          * SecureData Enterprise
            
          * Big Data
          * Cloud
          * Payments
          * Sentry
      
       * 
         Structured Data Manager
   
    * Identity and Access Management
      
      Identity and Access Management
      
       * NETIQ
         
         Identity and Access Management
         
         Our adaptive identity-centric expertise gives you an integrated
         platform for identity, access, and privilege management that drives
         your modern IT ecosystem.
         
         Use Cases
         
            NETIQ
            
            Identity and Access Management
            
            Use Cases
         
          * Access and Advanced Authentication
          * Identity Goverance
          * Least Privilege Access
          * Policy Unification
      
       * 
       * Access Management
         
            Access Management
         
          * Access Management
            
          * Access Manager
          * Advanced Authentication
          * Risk Service
          * Secure API Manager
          * SecureLogin
          * Self Service Password Reset
      
       * Identity Governance and Administration
         
            Identity Governance and Administration
         
          * Identity Governance and Adminstration
            
          * Data Access Governance
          * Identity Governance
          * Identity Manager
      
       * Privilege Management
         
            Privilege Management
         
          * Privilege Management
            
          * AD Bridge
          * Directory and Resource Administrator
          * Privileged Account Manager
      
       * Delegated Administration
         
            Delegated Administration
         
          * Delegated Administration
            
          * Change Guardian
          * Directory and Resource Administrator
          * Group Policy Administrator
          * Policy Compliance Assessor
          * Secure Configuration Manager
          * Security Solutions for IBM i
          * Universal Policy Administrator
   
    * Security Operations
      
      Security Operations
      
       * ARCSIGHT
         
         Security Operations
         
         A security analytics-powered resilient SOC that intelligently adapts to
         talent shortages by sharpening resource focus with faster, more
         accurate threat detection of both known and unknown threats.
         
         Use Cases
         
            ARCSIGHT
            
            Security Operations
            
            Use Cases
         
          * Exposure Time Reduction
          * Operational Efficiency
          * People-Centric Attack Mitigation
          * Pre-emptive Threat Detection
          * SecOps Compliance
      
       * 
       * 
         Enterprise Security Manager
       * 
         Intelligence
       * 
         Marketplace
       * 
         MITRE ATT&CK Framework
       * 
         Recon
       * 
         Security Open Data Platform
       * 
         Security Orchestration Automation and Response
       * 
         Sentinel
   
    * 
    * 
      Products A-Z
    * 
      Documentation

 * Resources
   
   Resources
   
    * 
      Resource Library
   
    * 
    * 
      Article
    * 
      Brochure
    * 
      Case Study
    * 
      Data Sheet
    * 
      eBook
    * 
      Video
    * 
      Webinar
    * 
      White Paper

 * Partners
   
   Partners
   
    * 
      Partner with CyberRes
   
    * 
    * 
      Partner Locator
    * 
      Partner Portal Login
    * Partner Solutions
      
      Partner Solutions
      
       * Cyber Resiliency Maturity Assessment
       * Data Security and Privacy Assessment
       * Managed Application Security
       * Managed Data Security and Privacy
       * Managed Detect and Response
       * Managed Identity, Access, and Governance
       * Managed Threat Hunting
       * Secure Development
       * Secure Digital Transformation Assessment
       * Secure Journey to Cloud
   
    * 
      Partnership Benefits
    * 
      Partnership Opportunities
    * Strategic Alliances
      
      Strategic Alliances
      
       * Accenture
       * Capgemini
       * Cognizant
       * CrowdStrike
       * Deloitte
       * DXC
       * PwC
       * Snowflake
       * Tata Consultancy Services

 * Customer Success
   
   Customer Success
   
    * 
      Free Trials
    * 
      Community
    * 
      Professional Services
    * 
      Success Stories
    * 
      Support
    * 
      Training
    * 
      User Groups

 * About CyberRes
   
   About CyberRes
   
    * 
      About
    * 
      Blog
    * 
      Careers
    * 
      Contact Us
    * 
      Events
    * 
      Press Room

 * Podcast
 * Academy
 * Community
 * Blog
 * Contact




VOLTAGE DATA PRIVACY AND PROTECTION

Voltage solutions discover, analyze, and protect sensitive structured and
unstructured data. It reduces breach risk, and enables data usability with
privacy across hybrid IT.

Read brochure
Learn more





THE FORRESTER WAVE™: UNSTRUCTURED DATA SECURITY PLATFORMS, Q2 2021

Download report



DATA DISCOVERY AND INSIGHT

Most organizations simply do not know where their data is. Voltage solutions
provide feature-rich, flexible data discovery and analysis to deliver data
minimization, application retirement, and data lifecycle use cases. Voltage File
Analysis Suite (FAS) is a completely SaaS-based content analysis solution
providing discovery, tagging, and context-aware analytics across unstructured
repositories. Structured Data Manager (SDM) discovers sensitive data in
on-premises, cloud, or hybrid systems and classifies data for disposition.

Watch webinar Read white paper




DATA PROTECTION

Privacy regulations such as the CCPA and GDPR recommend encryption and
pseudonymization as techniques to protect personal data. Voltage encryption,
tokenization, and hashing techniques retain meaning, context, and relationships
in protected data, while dramatically reducing the risk of data breach and
non-compliance with regulations. Voltage enables files, email, applications,
data, and data stores to interoperate with end-to-end protection across the data
lifecycle.

Learn more Watch webinar




DATA MINIMIZATION

Failure to proactively manage information bloat leads to unnecessarily high data
storage costs, increased compliance risks, and untapped potential in leveraging
data for improved business performance. Voltage enables enterprises to gain
control of application data, reduce risk through defensible deletion of data and
application retirement, and reduce the total cost of ownership of applications
infrastructure.

Read data sheet Read brochure




CUSTOMER SUCCESS STORIES

INTERNATIONAL CRIMINAL COURT

International Criminal Court uses Content Manager and ControlPoint to help
understand and control information.

Read case study

ALLEGIANT AIR

See how securing PCI and PII data helps revenues take off for Allegiant Air.

Watch video

ASTRAZENECA

AstraZeneca saves over $44 million using Content Manager.

Read success story

 * 
 * 
 * 


USE CASES

ACCELERATION TO CLOUD

Remove the primary obstacles to cloud migration. Protect data in use, in motion,
and at rest—in files, email, applications, and analytics platforms across hybrid
IT.

Learn more

IT MODERNIZATION

As data volumes increase, business risks increase. To modernize, contain costs,
and reduce risks, first identify and then classify the data to keep, to protect,
and to defensibly delete.

Learn more

DATA PRIVACY AND REGULATORY PRESSURES

Regulatory pressures are increasing, with data privacy a global trend. Voltage
solutions provide insight, control, automation, and policy-based management of
data continuously through the data lifecycle—from discovery to disposition.

Learn more

 * 
 * 
 * 


RELATED PRODUCTS

 


VOLTAGE SECUREDATA ENTERPRISE

Secure personal and high-value data wherever it flows: on-premises, in the
cloud, and in big data analytics. Encrypt, tokenize, and anonymize data to
enable privacy with maximum data utility and usability.

Learn more
 


VOLTAGE STRUCTURED DATA MANAGER

Discover and protect sensitive data, preserve its business value, and control
database growth. Automate data masking, encryption, and tokenization across
applications, databases, and data warehouses—from mainframe to serverless
compute.

Learn more
 


VOLTAGE FILE ANALYSIS SUITE

Discover and classify unstructured data through AI- powered analytics. Highly
scalable SaaS file analysis provides data discovery, tagging, context-aware
analytics, and collaboration across unstructured repositories and file shares
such as Exchange, Office365, Teams/SharePoint Online, cloud stores, and more.

Learn more
 


VOLLTAGE SMARTCIPHER

Simplify unstructured data security with persistent file encryption, complete
control, and visibility. Embed files with access and use controls with remote
policy enforcement.

Learn more
 


VOLTAGE SECUREMAIL

Ensure privacy compliance with a best-of-breed email encryption security
solution.

Learn more
 


VOLTAGE SECUREDATA PAYMENTS

Enable PCI security and compliance, reduce audit scope and costs, and secure
credit card data end-to-end.

Learn more


TRY IT NOW

Discuss your data privacy and protection needs with one of our product and
solutions experts.

Contact us


SOLUTIONS

 * Business Outcomes
 * Industry Solutions
 * Partner Solutions
 * Technology Outcomes
 * SaaS Services


PRODUCTS

 * A–Z Product Index
 * Application Security
 * Artificial Intelligence
 * Data Privacy and Protection
 * Identity and Access Management
 * Security Operations


INDUSTRIES

 * Energy
 * Financial
 * Healthcare
 * Public Sector and Government
 * Telecommunications
 * Transportation


QUICK LINKS

About CyberRes
Careers
Community
Contact
Events
Marketplace
Newsroom
Partners
TechBeacon
Training
User Groups

--------------------------------------------------------------------------------

 * CyberRes, a Micro Focus line of business
 * Terms of Use
 * Privacy
 * Code of Conduct
 * Accessibility
 * Anti-Slavery
 * Corporate Social Responsibility
   


release-rel-2021-11-1-7037 | Tue Nov 2 16:06:13 PDT 2021
7037
release/rel-2021-11-1-7037
Tue Nov 2 16:06:13 PDT 2021


Your choice regarding cookies on this site

We use cookies to give you the best possible online experience. You can change
your consent choices at any time by updating your cookie settings.

Configure cookies Accept all

Cookie Privacy Manager

Accept all

Some essential features on MicroFocus.com won’t work without certain cookies.
Other cookies help improve your experience by giving us insights into how you
use our site and providing you with relevant content. For more information,
please check out our cookie policy here .

ON✓

Strictly Necessary

These cookies provide a secure login experience and allow you to use essential
features of the site.

Analytics / Performance

Analytics cookies allow us to improve our website by giving us insights into how
you interact with our pages, what content you’re interested in, and identifying
when things aren’t working properly. The information collected is anonymous.

Targeting

We use targeting cookies to test new design ideas for pages and features on the
site so we can improve your experience. We also collect information about your
browsing habits so we can serve up content more relevant to your interests.
Disabling these cookies would mean the content you see on the site might not be
as relevant to you.

Functionality Allowed

 * Provide a secure login experience
 * Keep records of your cookie preferences and other settings
 * Enable customer service agents to chat with you

Functionality NOT Allowed

 * Anonymously track what pages are visited and what users click on
 * Remember if you’ve visited Micro Focus before
 * Understand how you got to our site
 * Test new page content and design ideas
 * Offer content and promotions more relevant to your interests
 * Serve up relevant Micro Focus ads when you browse other sites

Save and Exit