Content deleted Content added
m →top: References after punctuation per WP:REFPUNCT, WP:CITEFOOT, WP:PAIC + other fixes |
Citation bot (talk | contribs) Add: title. Changed bare reference to CS1/2. | Use this bot. Report bugs. | Suggested by BrownHairedGirl | Linked from User:BrownHairedGirl/Articles_with_bare_links | #UCB_webform_linked 1568/2189 |
||
Line 4:
Microsoft offers TDE as part of its [[Microsoft SQL Server]] 2008, 2008 R2, 2012, 2014, 2016, 2017 and 2019.<ref>{{Cite news|url=https://info.townsendsecurity.com/sql-server-tde-vs-cell-level-encryption-a-brief-comparison|title=SQL Server TDE vs CLE|access-date=2017-06-02|language=en}}</ref> TDE was only supported on the Evaluation, Developer, Enterprise and Datacenter editions of Microsoft SQL Server, until it was also made available in the Standard edition for 2019.<ref>[https://techcommunity.microsoft.com/t5/sql-server/sql-server-2019-standard-edition/ba-p/986121 "SQL Server 2019 Standard Edition"]''Microsoft Tech Community''</ref> SQL TDE is supported by [[hardware security module]]s from Thales e-Security, Townsend Security and SafeNet, Inc.
IBM offers TDE as part of [[IBM Db2|Db2]] as of version 10.5 fixpack 5.<ref>{{Cite web|url=https://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.wn.doc/doc/c0061179.html|title = Fix pack summary}}</ref> It is also supported in cloud versions of the product by default, Db2 on Cloud and Db2 Warehouse on Cloud.
Oracle requires the [[Oracle Advanced Security]] option for Oracle 10g and 11g to enable TDE.{{citation needed|date=July 2016}} Oracle TDE addresses encryption requirements associated with public and private privacy and security mandates such as PCI and [[California]] [[California Senate Bill 1386 (2002)|SB 1386]]. Oracle Advanced Security TDE column encryption was introduced in Oracle Database 10g Release 2. Oracle Advanced Security TDE tablespace encryption and support for [[hardware security module]]s (HSMs) were introduced with Oracle Database 11gR1. Keys for TDE can be stored in an HSM to manage keys across servers, protect keys with hardware, and introduce a separation of duties.
|