"Only approved users, processes and applications are allowed to see the data," Vormetric CEO Alan Kessler told CSO.
Still not perfect
When it comes to security, there are no absolute guarantees.
Even when a vendor claims not to have access to the encryption keys, things can still go wrong, said Adrian Sanabria, an analyst at New York-based 451 Research.
"That's still not a guarantee that there isn't a backdoor key that they or the government don't have access to," he told CSO.
For example, security firm RSA recently warned customers against using one of its random number generators because it was compromised by the NSA.
Even hardware-based encryption can potentially be compromised right in the factories where the chips are made, or during the design process.
"And there are knock-off products, like fake Cisco products that look almost identical but with different internals," he said.
In the end, he said, the goal is to manage risk, using the highest level of security available for the most sensitive data.
Sign up for MIS Asia eNewsletters.