Configuration Parameters for Protector
Update the mandatory and optional parameters to configure the protectors.
Update the mandatory and optional parameters to configure the protectors.
Set up the RP Agent to handle package downloads from the ESA.
Set up the RP Proxy to cache Resilient Packages. This component helps reduce the processing load on the ESA when a lot of protectors want to export packages.
The configuration parameters for RPP, such as log level, host and port, and service configuration.
The Log Forwarder is the log processing tool that collects the logs from the protectors and forwards them to the Audit Store.
Advantages of Resilient Deployment architecture over the PEP Server based architecture.
Verify the integrity of Protegrity generated protectors before installing the protectors to ensure security.
A general overview of protection methods supported by Protegrity products. It guides you through Protegrity protection methods, providing a comparison of all the protection methods.
Learn about the different Application Protectors.
Learn about the Big Data Protector.
Learn about the Data Warehouse Protectors.