...
- Encrypt sensitive data and files on servers
- Control access to the encrypted data
- Report who accesses encrypted data
Prerequisites
...
This feature is restricted to secure cloud servers that run on one of the following operating systems:
- CentOS 6.x
- CentOS 7.x
- Red Hat (RHEL) 6.x
- Red Hat (RHEL) 7.x
- Ubuntu 16.x
- Ubuntu 18.x
- Windows 2012 and 2012 R2 (Standard Edition)
- Windows 2008 and 2008 R2 (All Editions)
- Windows Server 2016
User Guides
...
At a high-level, in order to fully use Vormetric Encryption, Armor recommends that you follow the workflow below:
- Introduction to Vormetric's Data Security Manager (DSM)
- Create a symmetric encryption key Symmetric Encryption Key for Vormetric's DSM
- Vormetric Policy Planning
- Create a starter policy with learn modeStarter Policy with Learn Mode
- Introduction to Policy Rules
- Introduction to GuardPoints and the Copy Method
Info |
---|
TroubleshootingUse the following guides if you have already created a GuardPoint and are experiencing issues after a reboot. |
...