Vormetric Orchestrator

Operational Efficiency Through Orchestration

Vormetric Orchestrator

The Vormetric Orchestrator automates Vormetric Data Security Platform product deployment, configuration, management, and monitoring. Organizations can scale encryption implementations across large enterprise data centers and hybrid cloud environments—while dramatically reducing administrative effort and total cost of ownership. Vormetric Orchestrator automation simplifies operations, helps eliminate errors, and speeds deployments, to help reduce staff resources required to maintain and expand encryption deployments.

Vormetric Orchestrator
Accelerated Encryption Deployments

Deploy and register thousands of Vormetric Transparent Encryption Agents using API's that work with your IT automation tools and services.

Efficient Integration

A plug-in architecture enables fast integration with configuration management solutions such as Chef. RESTful APIs and CLI make for easy integration and scripting.

Flexible Deployment Options

Available as a virtual appliance, you can orchestrate Vormetric Data Security Platform products in your data centers or public or private cloud environments.

Virtual Appliance

Open Virtualization Format (.OVF) distribution:

  • Minimum memory requirements: 4GB
  • CPU requirements: 4 virtual CPUs

Amazon Web Services Amazon Machine Image (AMI)

Supported Configuration Managers
  • Chef (multiple unique Chef servers supported)
Automation Support
  • Vormetric Transparent Encryption Agents
    • Agent Installation
    • Agent Registration Mechanisms
      • Shared Secret
      • Fingerprint
    • Agent Updates
  • Vormetric Data Security Manager Configuration

Solution Brief : Vormetric Orchestrator

The Vormetric Orchestrator automates Vormetric Data Security Platform product deployment, configuration, management, and monitoring. Organizations can scale encryption implementations across large enterprise data centers and hybrid cloud environments. Read the solution brief!

Download

White Paper : Data Security Platform Architecture

As security teams struggle to contend with more frequent, costly, and sophisticated attacks, data-at-rest encryption becomes an increasingly critical safeguard. This white paper offers an overview of the different encryption approaches available today.

Download
인터랙티브 동영상 시청하기 자세히 보기
라이브 데모 예약하기 예약하기
전문가와 상담하기 연락하기