Chapter 1: The Data Security Manager
DSM Deployment
DSM Installation and Configuration Guide
Copyright 2009 - 2020 Thales Group. All rights reserved.
16
The DSM integrates key management, data security policy management, and event log collection into a centrally
managed platform that provides high availability and scalability to thousands of Vormetric Transparent Encryption
(VTE) Agents. This enables data security administrators to manage standards-based encryption across Linux, UNIX,
and Windows operating systems in both centralized and geographically distributed environments. The DSM supports
IPv4 and IPv6 addresses.
IPMI
The V6000 and V6100 DSM hardware appliances support the Intelligent Platform Management Interface (IPMI). IPMI
is a computer interface specification for autonomous computer subsystems. It provides remote access to the V6000
and V6100 hardware appliances. It allows administrators to remotely monitor appliance health (temperature, power
consumption, physical drive status, chassis intrusion), perform remote cold boots (power off and power on), and
access the DSM CLI from a remote location. IPMI is not supported by the DSM virtual appliance or hardware
appliances earlier than V6000/V6100.
As of this release, IPv6 addresses are supported on DSM hardware appliances. However IPv6 addresses cannot be
configured via the IPMI CLI. To configure an IPv6 address using IPMI, you must access the IPMI management
console UI.
Although not necessary for DSM maintenance and operation, some administrators may find the IPMI features useful.
IPMI activation and best practices are described in
Appendix C: "IPMI" on page 146
.
DSM Deployment
The Data Security Manager (DSM) enables centralized management of data security policies and key management,
simplifying training, deployment and operations.
A VTE environment consists of a DSM and one or more VTE Agents residing on your protected hosts. A protected
host contains the data to be protected, and can be on-site, in the cloud, or a hybrid of both. The VTE Agents
communicate with the DSM and implement security policies on their protected host systems.
Communication between agents and the DSM is encrypted and secure. DSM Administrators establish access and
manage encryption policies through a web-based management console, command line interface (CLI), and application
programming interfaces (API) including REST and SOAP.
VTE achieves security with complete transparency to end users with little impact to application performance. It
requires no changes to your existing infrastructure and supports separation of duties between data owners, system
administrators, and security administrators.