Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 53 Next »

Encryption allows enterprises to:

  • Encrypt sensitive data and files on servers
  • Control access to the encrypted data
  • Report who accesses encrypted data


Prerequisites 


This feature is restricted to secure cloud servers that run on one of the following operating systems:

  • CentOS 6.x
  • CentOS 7.x
  • Red Hat (RHEL) 6.x
  • Red Hat (RHEL) 7.x
  • Ubuntu 16.x
  • Ubuntu 18.x
  • Windows 2012 and 2012 R2 (Standard Edition)
  • Windows 2008 and 2008 R2 (All Editions)
  • Windows Server 2016


User Guides


At a high-level, in order to fully use Vormetric Encryption, Armor recommends that you follow the workflow below: 

  1. Introduction to Vormetric Data Security Manager
  2. Create a Symmetric Encryption Key for Vormetric DSM
  3. Vormetric Policy Planning
  4. Create a Starter Policy with Learn Mode
  5. Introduction to Policy Rules
  6. Introduction to GuardPoints and the Copy Method

Troubleshooting

Use the following guides if you have already created a GuardPoint and are experiencing issues after a reboot.




Was this helpful?

  • No labels