Protegrity AWS EC2 Protector

Overview of the Protegrity AWS EC2 Protector, which is a security operations cluster based on AWS EC2 instances.

The following sections outline the business problems faced by customers in protecting their data in a native cloud environment. It then lists the Protegrity solution to this business problem using security operations cluster based on AWS EC2 instances.

Business Problem

This section identifies the problems that a company faces while protecting data:

  • Protegrity customers are moving to the cloud. This includes data and workloads in support of transactional application and analytical systems.
  • Native Cloud capabilities can be used to solve this problem and deliver the agility and scalability required to keep up with the customers’ business.
  • AWS EC2 instances can be configured with Protegrity data security components that can leverage the auto scaling capabilities to scale.

Protegrity Solution

The Protegrity AWS EC2 Protector leverages cloud native capabilities to deliver a Protegrity data security operations cluster with the following characteristics:

  • Cloud standard Application Protector Java (AP Java):
    • The AP Java is integrated with a custom application and is deployed on an Auto Scaling Group on an EC2 instance.
    • Customers can integrate their applications with the AP Java libraries and then deploy the application on an Auto Scaling Group.
  • Support for Dynamic deployment:
    • Dynamic deployment: The dynamic term refers to runtime updates to policy changes that are applied to the cluster. Dynamic updates are managed by RPSync. RPSync is connected to the ESA and applies the policy changes to the Protegrity AWS EC2 Protectors.
    • Changes to Policy or the Sample Application itself happen through special deployment strategies available through CloudFormation templates.
  • Auto Scalability:
    • EC2 Auto Scaling Groups can be set up to auto scale based on setting a configuration on network loads.
    • Auto Scaling Groups will start with an initial set of EC2 instances. These will increase when the network load is passed, and they will shrink when the network load is under the acceptable limits. This is automatic and hence gives the agility and scalability that is desired with cloud solutions.

For more information about the Application Java Protector, refer to the section Application Protector Java.


Understanding the Architecture

Overview of the AWS EC2 Container architecture.

System Requirements

Overview of the system requirements.

Preparing the Environment

Preparing the environment for deploying the protector.

Installing the Protector

Deploying the CloudFormation template.

Running Security Operations

Describes how to run the security operations using the EC2 instances.

Upgrading the Protector from Version 9.x to 10.x

Explains how to upgrade the protector from version 9.x to 10.x.

Upgrading the Protector from Version 10.x to 10.y

Explains how to perform rolling upgrades and roll backs for the AWS EC2 protector.


Last modified : February 25, 2026