Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Encrypt sensitive data and files on servers
  • Control access to the encrypted data
  • Report who accesses encrypted data


Prerequisites 

...

This feature is restricted to secure cloud servers that run on one of the following operating systems:

  • CentOS 6.x
  • CentOS 7.x
  • Red Hat (RHEL) 6.x
  • Red Hat (RHEL) 7.x
  • Ubuntu 16.x
  • Ubuntu 18.x
  • Windows 2012 and 2012 R2 (Standard Edition)
  • Windows 2008 and 2008 R2 (All Editions)
  • Windows Server 2016


User Guides

...

At a high-level, in order to fully use Vormetric Encryption, Armor recommends that you follow the workflow below: 

  1. Introduction to Vormetric's Data Security Manager (DSM)
  2. Create a symmetric encryption key Symmetric Encryption Key for Vormetric's DSM
  3. Vormetric Policy Planning
  4. Create a starter policy with learn modeStarter Policy with Learn Mode
  5. Introduction to Policy Rules
  6. Introduction to GuardPoints and the Copy Method

Info

Troubleshooting

Use the following guides if you have already created a GuardPoint and are experiencing issues after a reboot.

...