CipherTrust Intelligent Protection
This document describes the CipherTrust Intelligent Protection (CIP) solution. The document explains how Intelligent Protection can be used by customers to Discover and Protect their sensitive data. Customers can run the DDC Scan to identify the sensitive data located on different Data Stores.Next, they can configure CTE Policy and GuardPoint to protect their data based on i information discovered by DDC. This integration between DDC and CTE provides an Intelligent way to protect data based on sensitivity.
It is assumed, for this document, that you have already configured the CipherTrust Manager appliance. Refer to the CipherTrust Manager product documentation for instructions.
Organization
This document contains the following sections:
Overview: Provides a high-level overview of the CIP solution.
Configuration: Provides details about setup requirement and configuration to be performed on CM, TDP, DDC, and CTE.
Scans: Describes how to add, configure, and execte DDC scan to enable Intelligent Protection.
Reports: Provides information about DDC report and analysis.
CTE Policies: Describes CTE Policy resource and configuration for CIP solution.
File Operations with CIP: Describes behavior for File Operations on files protected using CIP solution.
Backup and Restore: Provides information how to perform Backup and Restore of data protected with CIP.