Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Encryption allows enterprises to:

  • Encrypt sensitive data and files on servers

  • Control access to the encrypted data

  • Report who accesses encrypted data


Prerequisites Prerequisites

...

This feature is restricted to secure cloud servers that run on one of the following operating systems:

  • CentOS 6.x

  • CentOS 7.x

  • Red Hat (RHEL) 6.x

  • Red Hat (RHEL) 7.x

  • Ubuntu 16.x

  • Ubuntu 18.x

  • Windows 2012 and 2012 R2 (Standard Edition

...

  • )

  • Windows Server 2016


User Guides

...

At a high-level, in order to fully use Vormetric Encryption, Armor recommends that you follow the workflow below:  

  1. Introduction to Vormetric

...

  1. Data Security Manager

...

  1. Create a Symmetric Encryption Key for Vormetric

...

  1. DSM

  2. Vormetric Policy Planning

  3. Create a Starter Policy with Learn Mode

  4. Introduction to Policy Rules

  5. Introduction to GuardPoints and the Copy Method

Info

Troubleshooting

Use the following guides if you have already created a GuardPoint and are experiencing issues after a reboot.

...


Topics Discussed

Table of Contents
maxLevel3
minLevel3