Overview of installation

Information about the intended audience is covered here. A general architecture and an overview of the Protegrity Data Security Platform is also described to provide a better understanding of the products.

Audience

The installation steps is intended for the following stakeholders:

  • Security professionals like security officers who are responsible for protecting business systems in organizations. They plan and ensure execution of security arrangement for their organization.
  • System administrators and other technical personnel who are responsible for implementing data security solutions in their organization.
  • System Architects who are responsible for providing expert guidance in designing, development and implementation of enterprise data security solution architecture for their business requirements.

Protegrity Data Security Platform

The Protegrity Data Security Platform is a comprehensive source of enterprise data protection solutions. Its design is based on a hub and spoke deployment architecture.

The Protegrity Data Security Platform has following components:

Enterprise Security Administrator (ESA) – that handles the management of policies, keys, monitoring, auditing and reporting of protected systems in the enterprise.

Data Protectors – that protect sensitive data in the enterprise and deploy security policy for enforcement on each installed system. Policy is deployed from ESA to the Data Protectors. The Audit Logs of all activity on sensitive data are reported and stored in the Audit Store cluster on the ESA.

General architecture

The following diagram shows the general architecture of the Protegrity Data Security Platform.

Last modified January 30, 2025