Page tree




In This Document 


Was this document useful? 
Your Rating:
Results:
1 Star2 Star3 Star4 Star5 Star
1 rates


Have a suggestion for the Armor Knowledge Base? Send a message to kb@armor.com.



This topic only applies to Armor Complete users. 


Introduction

Encryption allows enterprises to:

  • Encrypt sensitive data and files on servers
  • Control access to the encrypted data
  • Report who accesses encrypted data

Prerequisites 

This feature is restricted to secure cloud servers that run on one of the following operating systems:

  • CentOS 5.x
  • CentOS 6.x
  • Red Hat (RHEL) 5.x
  • Red Hat (RHEL) 6.x
  • Windows 2012 and 2012 R2 (Standard Edition)
  • Windows 2008 and 2008 R2 (All Editions)
  • Windows 2003 and 2003 R2 (All Editions)

User guides

At a high-level, in order to fully use Vormetric Encryption, Armor recommends that you follow the workflow below: 

  1. Introduction to Vormetric's Data Security Manager (DSM)
  2. Create a symmetric encryption key for Vormetric's DSM
  3. Vormetric Policy Planning
  4. Create a starter policy with learn mode
  5. Introduction to Policy Rules
  6. Introduction to GuardPoints and the Copy Method

Troubleshooting user guides

Use the following guides if you have already created a GuardPoint and are experiencing issues after a reboot.