Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Note
Home > Product User Guides > Armor Marketplace > Vormetric encryption: User guides and training videos

Excerpt Include
Armor Complete users (snippet)
Armor Complete users (snippet)
nopaneltrue


Introduction

Encryption allows enterprises to:

  • Encrypt sensitive data and files on servers
  • Control access to the encrypted data
  • Report who accesses encrypted data

...

Prerequisites 

This feature is restricted to secure cloud servers that run on one of the following operating systems:

  • CentOS 5.x
  • CentOS 6.x
  • Red Hat (RHEL) 5.x
  • Red Hat (RHEL) 6.x
  • Windows 2012 and 2012 R2 (Standard Edition)
  • Windows 2008 and 2008 R2 (All Editions)
  • Windows 2003 and 2003 R2 (All Editions)

...

User guides

...

At a high-level, in order to fully use Vormetric Encryption, Armor recommends that you follow the workflow below: 

  1. Introduction to Vormetric's Data Security Manager (DSM)
  2. Create a symmetric encryption key for Vormetric's DSM
  3. Vormetric Policy Planning
  4. Create a starter policy with learn mode
  5. Introduction to Policy Rules
  6. Introduction to GuardPoints and the Copy Method

...

Troubleshooting user guides

Use the following guides if you have already created a GuardPoint and are experiencing issues after a reboot.

...