Vormetric, a leader in enterprise data security for physical, virtual and cloud environments, announced today that a case study on Con-way Inc. and its implementation of Vormetric Transparent Encryption is now available. The case study explores how Con-way is utilizing Vormetric’s integrated encryption and key management for data-at-rest to protect customer personally identifiable information (PII), proprietary data and intellectual property in databases and file systems throughout Con-way’s infrastructure. <Click to Tweet:> Customer Success @ConwayInc – Encryption + Key Management from @Vormetric protects customer information http://bit.ly/1ohqlTf
Con-way is a leader in freight transportation and logistics services, headquartered in Ann Arbor, Michigan, with over 500 locations across North America and global operations in 20 countries. Operating through Con-way Freight, Con-way Truckload, and Menlo Worldwide Logistics they provide high-performance, day-definite less-than-truckload (LTL), full truckload and intermodal freight transportation; logistics, warehousing and supply chain management services; and trailer manufacturing. As a result of these businesses, Con-way handles a large volume of sensitive customer information, including PII, proprietary data and intellectual property, and found it imperative to secure all the information with which they were entrusted.
At the same time, the solution selected had to minimize performance and operational overhead. The company’s IT infrastructure utilizes several operating systems, including Linux, AIX® and Windows® and makes extensive use of Oracle, SQL Server and other database platforms – all of these data-at-rest environments required a data protection solution. After an extensive evaluation of storage level, operating system, and native database encryption solutions, as well as home-grown and proprietary key management offerings, they selected Vormetric. Vormetric protects data-at-rest throughout Con-way’s IT infrastructure with:
- A single integrated solution with encryption and key management across the entire environment – including all file systems and databases
- Nominal impact on transactional throughput
- Minimal administrative overhead