...
id | 202419081 |
---|
...
id | 202419093 |
---|
Section | ||||||
---|---|---|---|---|---|---|
| ||||||
Topics Discussed
|
...
id | 202419082 |
---|
Encryption allows enterprises to:
- Encrypt sensitive data and files on servers
- Control access to the encrypted data
- Report who accesses encrypted data
Prerequisites
...
This feature is restricted to secure cloud servers that run on one of the following operating systems:
- CentOS 6.x
- CentOS 7.x
- Red Hat (RHEL) 6.x
- Red Hat (RHEL) 7.x
- Ubuntu 16.x
- Ubuntu 18.x
- Windows 2012 and 2012 R2 (Standard Edition)
- Windows Server 2016
User Guides
...
At a high-level, in order to fully use Vormetric Encryption, Armor recommends that you follow the workflow below:
- Introduction to Vormetric Data Security Manager
- Create a Symmetric Encryption Key for Vormetric DSM
- Vormetric Policy Planning
- Create a Starter Policy with Learn Mode
- Introduction to Policy Rules
- Introduction to GuardPoints and the Copy Method
Info |
---|
TroubleshootingUse the following guides if you have already created a GuardPoint and are experiencing issues after a reboot. |
Was this helpful?
Topics Discussed
Table of Contents | ||||
---|---|---|---|---|
|