...
DSM serves two main functions:
Expand |
---|
title | 1. Transparent File Encryption |
---|
|
Also known as at-rest file encryption, transparent file encryption performs two tasks: - Encrypts data as the data is written onto the disk
- Decrypts data as it is read from the disk
|
Expand |
---|
|
The DSM configures policies that control access to encrypted directories. These Vormetric-protected directories are called GuardPoints. These GuardPoints allow the DSM Security Administrator to: - Maintain granular control over which users and processes can access GuardPoints
- Create multiple policies for different types of operational usage
- Vormetric policy access controls work beneath, but in relation to the operational system-level access control lists (ACL).
|
...