www.microfocus.com
Open in
urlscan Pro
2.16.186.176
Public Scan
Submitted URL: http://www.voltage.com/
Effective URL: https://www.microfocus.com/en-us/cyberres/data-privacy-protection
Submission: On November 04 via api from DE — Scanned from DE
Effective URL: https://www.microfocus.com/en-us/cyberres/data-privacy-protection
Submission: On November 04 via api from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to Main Content Skip to Footer YOUR BROWSER IS NOT SUPPORTED For the best experience, use Google Chrome or Mozilla Firefox. * Podcast * Academy * Community * Blog * Contact × * Solutions * Business Outcomes * Secure Cloud * Secure Customer Identities * Secure Data * Secure Digital Transformation * Secure the Enterprise * Secure the Value Chain * Secure Third-Party Risk * Industry Solutions * Energy * Financial Services * Healthcare * Public Sector and Government Services * Telecommunications * Transportation * Partner Solutions * Cyber Resiliency Maturity Assessment * Data Security and Privacy Assessment * Managed Application Security * Managed Data Security and Privacy * Managed Detect and Response * Managed Identity, Access, and Governance * Managed Threat Hunting * Secure Development * Secure Digital Transformation Assessment * Secure Journey to Cloud * SaaS Services * Application Security as a Service * Data Security as a Service * Identity as a Service * SecOps as a Service * Technology Outcomes * Advanced Threat Detection and Response * Breach Assessment * Data, Access, and Identity Governance * Next-Generation Security Operations * Privacy and Compliance * Secure Development and Testing * Zero Trust * Products * Application Security * FORTIFY Application Security Build secure software fast with an application security platform that automates testing throughout the CI/CD pipeline to enable developers to quickly resolve issues. Use Cases * Developer-Driven Security * DevSecOps * Enterprise DAST * Integrating Security into the CI/CD Pipeline * Reducing Software Risk * Scale Secure Software * * Fortify on Demand * Integration Ecosystem * Marketplace * Software Composition Analysis * Software Security Center * Static Code Analyzer * WebInspect * Artificial Intelligence * INTERSET Artificial Intelligence Interset augments human intelligence with machine intelligence to strengthen your cyber resilience. * Interset * Data Privacy and Protection * VOLTAGE Data Privacy and Protection Discover, analyze, and protect sensitive structured and unstructured data, reduce breach risk, and enable data usability with privacy across hybrid IT. Use Cases * Acceleration to the Cloud * Data Privacy and Regulatory Pressures * IT Modernization * * Unstructured Data File Analysis Suite * File Analysis Suite * Data Access * Data Discovery * Data Management * SecureMail * SmartCipher * Structured Data SecureData Enterprise * SecureData Enterprise * Big Data * Cloud * Payments * Sentry * Structured Data Manager * Identity and Access Management * NETIQ Identity and Access Management Our adaptive identity-centric expertise gives you an integrated platform for identity, access, and privilege management that drives your modern IT ecosystem. Use Cases * Access and Advanced Authentication * Identity Goverance * Least Privilege Access * Policy Unification * * Access Management * Access Management * Access Manager * Advanced Authentication * Risk Service * Secure API Manager * SecureLogin * Self Service Password Reset * Identity Governance and Administration * Identity Governance and Adminstration * Data Access Governance * Identity Governance * Identity Manager * Privilege Management * Privilege Management * AD Bridge * Directory and Resource Administrator * Privileged Account Manager * Delegated Administration * Delegated Administration * Change Guardian * Directory and Resource Administrator * Group Policy Administrator * Policy Compliance Assessor * Secure Configuration Manager * Security Solutions for IBM i * Universal Policy Administrator * Security Operations * ARCSIGHT Security Operations A security analytics-powered resilient SOC that intelligently adapts to talent shortages by sharpening resource focus with faster, more accurate threat detection of both known and unknown threats. Use Cases * Exposure Time Reduction * Operational Efficiency * People-Centric Attack Mitigation * Pre-emptive Threat Detection * SecOps Compliance * * Enterprise Security Manager * Intelligence * Marketplace * MITRE ATT&CK Framework * Recon * Security Open Data Platform * Security Orchestration Automation and Response * Sentinel * * Products A-Z * Documentation * Resources * Resource Library * * Article * Brochure * Case Study * Data Sheet * eBook * Video * Webinar * White Paper * Partners * Partner with CyberRes * * Partner Locator * Partner Portal Login * Partner Solutions * Cyber Resiliency Maturity Assessment * Data Security and Privacy Assessment * Managed Application Security * Managed Data Security and Privacy * Managed Detect and Response * Managed Identity, Access, and Governance * Managed Threat Hunting * Secure Development * Secure Digital Transformation Assessment * Secure Journey to Cloud * Partnership Benefits * Partnership Opportunities * Strategic Alliances * Accenture * Capgemini * Cognizant * CrowdStrike * Deloitte * DXC * PwC * Snowflake * Tata Consultancy Services * Customer Success * Free Trials * Community * Professional Services * Success Stories * Support * Training * User Groups * About CyberRes * About * Blog * Careers * Contact Us * Events * Press Room ‹ * Solutions Solutions * Business Outcomes Business Outcomes * Secure Cloud * Secure Customer Identities * Secure Data * Secure Digital Transformation * Secure the Enterprise * Secure the Value Chain * Secure Third-Party Risk * Industry Solutions Industry Solutions * Energy * Financial Services * Healthcare * Public Sector and Government Services * Telecommunications * Transportation * Partner Solutions Partner Solutions * Cyber Resiliency Maturity Assessment * Data Security and Privacy Assessment * Managed Application Security * Managed Data Security and Privacy * Managed Detect and Response * Managed Identity, Access, and Governance * Managed Threat Hunting * Secure Development * Secure Digital Transformation Assessment * Secure Journey to Cloud * SaaS Services SaaS Services * Application Security as a Service * Data Security as a Service * Identity as a Service * SecOps as a Service * Technology Outcomes Technology Outcomes * Advanced Threat Detection and Response * Breach Assessment * Data, Access, and Identity Governance * Next-Generation Security Operations * Privacy and Compliance * Secure Development and Testing * Zero Trust * Products Products * Application Security Application Security * FORTIFY Application Security Build secure software fast with an application security platform that automates testing throughout the CI/CD pipeline to enable developers to quickly resolve issues. Use Cases FORTIFY Application Security Use Cases * Developer-Driven Security * DevSecOps * Enterprise DAST * Integrating Security into the CI/CD Pipeline * Reducing Software Risk * Scale Secure Software * * Fortify on Demand * Integration Ecosystem * Marketplace * Software Composition Analysis * Software Security Center * Static Code Analyzer * WebInspect * Artificial Intelligence Artificial Intelligence * INTERSET Artificial Intelligence Interset augments human intelligence with machine intelligence to strengthen your cyber resilience. * Interset * Data Privacy and Protection Data Privacy and Protection * VOLTAGE Data Privacy and Protection Discover, analyze, and protect sensitive structured and unstructured data, reduce breach risk, and enable data usability with privacy across hybrid IT. Use Cases VOLTAGE Data Privacy and Protection Use Cases * Acceleration to the Cloud * Data Privacy and Regulatory Pressures * IT Modernization * * Unstructured Data File Analysis Suite Unstructured Data File Analysis Suite * File Analysis Suite * Data Access * Data Discovery * Data Management * SecureMail * SmartCipher * Structured Data SecureData Enterprise Structured Data SecureData Enterprise * SecureData Enterprise * Big Data * Cloud * Payments * Sentry * Structured Data Manager * Identity and Access Management Identity and Access Management * NETIQ Identity and Access Management Our adaptive identity-centric expertise gives you an integrated platform for identity, access, and privilege management that drives your modern IT ecosystem. Use Cases NETIQ Identity and Access Management Use Cases * Access and Advanced Authentication * Identity Goverance * Least Privilege Access * Policy Unification * * Access Management Access Management * Access Management * Access Manager * Advanced Authentication * Risk Service * Secure API Manager * SecureLogin * Self Service Password Reset * Identity Governance and Administration Identity Governance and Administration * Identity Governance and Adminstration * Data Access Governance * Identity Governance * Identity Manager * Privilege Management Privilege Management * Privilege Management * AD Bridge * Directory and Resource Administrator * Privileged Account Manager * Delegated Administration Delegated Administration * Delegated Administration * Change Guardian * Directory and Resource Administrator * Group Policy Administrator * Policy Compliance Assessor * Secure Configuration Manager * Security Solutions for IBM i * Universal Policy Administrator * Security Operations Security Operations * ARCSIGHT Security Operations A security analytics-powered resilient SOC that intelligently adapts to talent shortages by sharpening resource focus with faster, more accurate threat detection of both known and unknown threats. Use Cases ARCSIGHT Security Operations Use Cases * Exposure Time Reduction * Operational Efficiency * People-Centric Attack Mitigation * Pre-emptive Threat Detection * SecOps Compliance * * Enterprise Security Manager * Intelligence * Marketplace * MITRE ATT&CK Framework * Recon * Security Open Data Platform * Security Orchestration Automation and Response * Sentinel * * Products A-Z * Documentation * Resources Resources * Resource Library * * Article * Brochure * Case Study * Data Sheet * eBook * Video * Webinar * White Paper * Partners Partners * Partner with CyberRes * * Partner Locator * Partner Portal Login * Partner Solutions Partner Solutions * Cyber Resiliency Maturity Assessment * Data Security and Privacy Assessment * Managed Application Security * Managed Data Security and Privacy * Managed Detect and Response * Managed Identity, Access, and Governance * Managed Threat Hunting * Secure Development * Secure Digital Transformation Assessment * Secure Journey to Cloud * Partnership Benefits * Partnership Opportunities * Strategic Alliances Strategic Alliances * Accenture * Capgemini * Cognizant * CrowdStrike * Deloitte * DXC * PwC * Snowflake * Tata Consultancy Services * Customer Success Customer Success * Free Trials * Community * Professional Services * Success Stories * Support * Training * User Groups * About CyberRes About CyberRes * About * Blog * Careers * Contact Us * Events * Press Room * Podcast * Academy * Community * Blog * Contact VOLTAGE DATA PRIVACY AND PROTECTION Voltage solutions discover, analyze, and protect sensitive structured and unstructured data. It reduces breach risk, and enables data usability with privacy across hybrid IT. Read brochure Learn more THE FORRESTER WAVE™: UNSTRUCTURED DATA SECURITY PLATFORMS, Q2 2021 Download report DATA DISCOVERY AND INSIGHT Most organizations simply do not know where their data is. Voltage solutions provide feature-rich, flexible data discovery and analysis to deliver data minimization, application retirement, and data lifecycle use cases. Voltage File Analysis Suite (FAS) is a completely SaaS-based content analysis solution providing discovery, tagging, and context-aware analytics across unstructured repositories. Structured Data Manager (SDM) discovers sensitive data in on-premises, cloud, or hybrid systems and classifies data for disposition. Watch webinar Read white paper DATA PROTECTION Privacy regulations such as the CCPA and GDPR recommend encryption and pseudonymization as techniques to protect personal data. Voltage encryption, tokenization, and hashing techniques retain meaning, context, and relationships in protected data, while dramatically reducing the risk of data breach and non-compliance with regulations. Voltage enables files, email, applications, data, and data stores to interoperate with end-to-end protection across the data lifecycle. Learn more Watch webinar DATA MINIMIZATION Failure to proactively manage information bloat leads to unnecessarily high data storage costs, increased compliance risks, and untapped potential in leveraging data for improved business performance. Voltage enables enterprises to gain control of application data, reduce risk through defensible deletion of data and application retirement, and reduce the total cost of ownership of applications infrastructure. Read data sheet Read brochure CUSTOMER SUCCESS STORIES INTERNATIONAL CRIMINAL COURT International Criminal Court uses Content Manager and ControlPoint to help understand and control information. Read case study ALLEGIANT AIR See how securing PCI and PII data helps revenues take off for Allegiant Air. Watch video ASTRAZENECA AstraZeneca saves over $44 million using Content Manager. Read success story * * * USE CASES ACCELERATION TO CLOUD Remove the primary obstacles to cloud migration. Protect data in use, in motion, and at rest—in files, email, applications, and analytics platforms across hybrid IT. Learn more IT MODERNIZATION As data volumes increase, business risks increase. To modernize, contain costs, and reduce risks, first identify and then classify the data to keep, to protect, and to defensibly delete. Learn more DATA PRIVACY AND REGULATORY PRESSURES Regulatory pressures are increasing, with data privacy a global trend. Voltage solutions provide insight, control, automation, and policy-based management of data continuously through the data lifecycle—from discovery to disposition. Learn more * * * RELATED PRODUCTS VOLTAGE SECUREDATA ENTERPRISE Secure personal and high-value data wherever it flows: on-premises, in the cloud, and in big data analytics. Encrypt, tokenize, and anonymize data to enable privacy with maximum data utility and usability. Learn more VOLTAGE STRUCTURED DATA MANAGER Discover and protect sensitive data, preserve its business value, and control database growth. Automate data masking, encryption, and tokenization across applications, databases, and data warehouses—from mainframe to serverless compute. Learn more VOLTAGE FILE ANALYSIS SUITE Discover and classify unstructured data through AI- powered analytics. Highly scalable SaaS file analysis provides data discovery, tagging, context-aware analytics, and collaboration across unstructured repositories and file shares such as Exchange, Office365, Teams/SharePoint Online, cloud stores, and more. Learn more VOLLTAGE SMARTCIPHER Simplify unstructured data security with persistent file encryption, complete control, and visibility. Embed files with access and use controls with remote policy enforcement. Learn more VOLTAGE SECUREMAIL Ensure privacy compliance with a best-of-breed email encryption security solution. Learn more VOLTAGE SECUREDATA PAYMENTS Enable PCI security and compliance, reduce audit scope and costs, and secure credit card data end-to-end. Learn more TRY IT NOW Discuss your data privacy and protection needs with one of our product and solutions experts. Contact us SOLUTIONS * Business Outcomes * Industry Solutions * Partner Solutions * Technology Outcomes * SaaS Services PRODUCTS * A–Z Product Index * Application Security * Artificial Intelligence * Data Privacy and Protection * Identity and Access Management * Security Operations INDUSTRIES * Energy * Financial * Healthcare * Public Sector and Government * Telecommunications * Transportation QUICK LINKS About CyberRes Careers Community Contact Events Marketplace Newsroom Partners TechBeacon Training User Groups -------------------------------------------------------------------------------- * CyberRes, a Micro Focus line of business * Terms of Use * Privacy * Code of Conduct * Accessibility * Anti-Slavery * Corporate Social Responsibility release-rel-2021-11-1-7037 | Tue Nov 2 16:06:13 PDT 2021 7037 release/rel-2021-11-1-7037 Tue Nov 2 16:06:13 PDT 2021 Your choice regarding cookies on this site We use cookies to give you the best possible online experience. You can change your consent choices at any time by updating your cookie settings. Configure cookies Accept all Cookie Privacy Manager Accept all Some essential features on MicroFocus.com won’t work without certain cookies. Other cookies help improve your experience by giving us insights into how you use our site and providing you with relevant content. For more information, please check out our cookie policy here . ON✓ Strictly Necessary These cookies provide a secure login experience and allow you to use essential features of the site. Analytics / Performance Analytics cookies allow us to improve our website by giving us insights into how you interact with our pages, what content you’re interested in, and identifying when things aren’t working properly. The information collected is anonymous. Targeting We use targeting cookies to test new design ideas for pages and features on the site so we can improve your experience. We also collect information about your browsing habits so we can serve up content more relevant to your interests. Disabling these cookies would mean the content you see on the site might not be as relevant to you. Functionality Allowed * Provide a secure login experience * Keep records of your cookie preferences and other settings * Enable customer service agents to chat with you Functionality NOT Allowed * Anonymously track what pages are visited and what users click on * Remember if you’ve visited Micro Focus before * Understand how you got to our site * Test new page content and design ideas * Offer content and promotions more relevant to your interests * Serve up relevant Micro Focus ads when you browse other sites Save and Exit