Architectures
The architectures describe the working of the system. It shows how the various components work together for processing URP operations, policies, and the flow of logs.
Protegrity Data Security Platform provides policy management and data protection. It has as its main component the ESA. Working in combination with a Protegrity database protector, application protector, file protector, or big data protector it can be used for managing data security policy, key management, and auditing and reporting.
The architectures describe the working of the system. It shows how the various components work together for processing URP operations, policies, and the flow of logs.
Overview of the Appliances
A general overview of the Protegrity Data Security Platform and the intended audience of this guide.
Install ESA on-premise or on a cloud platform.
Log in to the CLI Manager or Web UI of ESA.
Describes the operations performed using the Web User Interface
VMware tools in appliances
The steps to increase the total disk size of the Appliance.
Protegrity Data Security platform uses many keys to protect your sensitive data.
Policies help to determine, specify and enforce certain data security rules
Insight stores logs in the Audit Store. The Audit Store is a repository for all audit data and logs on the ESA. The Audit Store cluster is built to support multiple nodes making it scalable. Thus, you can add nodes to the Audit Store cluster as per your requirements. It uses certificates for inter-node communication, making it secure.
Maintaining the logs and indexes in Insight includes the process for archiving and creating scheduled tasks.