Overview
The Zettaset XCrypt Suite data security solution for Linux distributions is a high performance, infinitely scalable, data activity monitoring and advanced encryption solution. XCrypt Insights provides unified visibility and control with advanced monitoring to detect cyberattacks earlier across cloud, hybrid, and edge environments. It is advanced monitoring of data activity across cloud environments, provides actionable intelligence and delivers complete and relevant context, in every alert. Included in the XCrypt Suite, XCrypt Advanced Encryption protects data with a volume layer approach for intelligence, high performance, and scalability to meet any workload requirements and to maximize cyber resilience. Advanced Encryption is ideal for bulk encryption of stored data and operating system volumes. It can be applied to both data at rest volumes and data in motion. The Zettaset software approach to activity monitoring and encryption can be deployed without the need for proprietary appliances, simplifying deployment and making it ideal for cloud environments.
Highlights
- Detects cyberattacks faster by monitoring data activity to mitigate threats and improve response efficiency across cloud, hybrid, and edge environments.
- Improves your data security posture as you migrate from CentOS with an advanced data security solution purpose built for Linux distributions.
- Protects data at any scale with a volume layer approach to data security for intelligence and high performance, to meet any workload requirement.
Details
Typical total price
$0.325/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
m5.large Recommended | $0.20 | $0.125 | $0.325 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
No Refund. Contact sales@zettaset.comÂ
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Log on to AMI using ec2-user credentials . There is a README in /home/ec2-user. This will help in deploying the product. Usage instructions give detailed steps.
The AMI instance is running RHEL 9.2 OS. All the pre requisites for the product have been installed. For any other modules that may be needed for the application(s) you may deploy may require Red Hat subscription.
Additional details
Usage instructions
Zettaset XCrypt Full Disk Encryption Copyright Zettaset 2018-2023 Version 1.0.15 Last Edited: 10/03/2023
SSH in to the AMI instance using following credentials ec2-user
Perform the following steps on the node in your deployment:
-
Add a password for ec2-user:
sudo passwd ec2-user Changing password for user ec2-user. New password: Retype new password: passwd: all authentication tokens updated successfully.
Edit the sshd_config and restart sshd:
sudo vi /etc/ssh/sshd_config and change all PasswordAuthentication to yes PasswordAuthentication yes
sudo service sshd restart
-
Establish ssh trust on the node: Note: A sample /etc/hosts file is provided below: The ip address 172.31.3.66 needs to be replaced with the address got from ifconfig eth0 | grep inet | grep -v inet6
cat /etc/hosts 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6 172.31.3.66 redhat-9.2 172.31.3.66 node01
NOTE: We need to have two entries for the node, so that installer can run its checks.
a. Generate an ssh key for the install user: ssh-keygen
b. Distribute the key to each target node: ssh-copy-id redhat-9.2 ssh-copy-id node01
-
Check Firewalld Status and start if required sudo systemctl status firewalld
sudo systemctl enable firewalld sudo systemctl start firewalld
Run the command below to check that ports 6666/8789/21800 are open. sudo firewall-cmd --list-all
-
When deploying this product, you might want to configure the following partitions. This will become the encrypted partition. This requires an extra disk to be added initially.
sudo mkfs.ext4 /dev/nvme1n1
-
Check the configuration for running the check and install of Xcrypt.
cd /home/ec2-user/zettaset/xcrypt-full-disk Check that the sample entries match the AWS node's. e.g The license file should be in the path specified.
Perform a sanity check on the inventory file. This will confirm that the settings in your file are valid.
- install_zts-xcrypt-full-disk.sh -vv -i hosts.inv check
After the sanity check runs, remove the extra entry in the hosts.inv file i.e: The kmip entry will have only node01 NOTE: This is important. We need to have only one entry here for kmip.
[kmip] node01
- Run the installer install_zts-xcrypt-full-disk.sh -vv -i hosts.inv install
This will create the encrypted partition.
Support
Vendor support
At Zettaset our goal is to ensure a positive, consistent, and successful customer experience with each one of our advanced data protection solutions. As part of our on-going commitment, Zettaset offers a world-class customer service and support program to effectively complement our industry-leading data security products. Every aspect of our customer service and support program is staffed by expert and highly-trained engineers who have years of experience in cybersecurity and regulatory compliance required. Contact info: Phone:+1-866-561-4981 Email: support@zettaset.com To learn more about Zettaset XCrypt Suite visit www.zettaset.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
