Listing Thumbnail

    Zettaset Data Security for CentOS Linux Migrations

     Info
    Sold by: Zettaset 
    Free Trial
    The Zettaset XCrypt Suite provides enhanced data security for Linux distributions by accelerating the time it takes to detect a cyberattack. Zettaset XCrypt monitors data activity to mitigate threats and improve response efficiency across cloud, hybrid, and edge environments. Now you can realize an advanced security solution and move beyond LUKS and NBDE with Zettaset data activity monitoring, threat detection, and volume or partition data encryption for large scale cloud and hybrid deployments. Zettaset makes it easy for CentOS users to improve as they make their Linux migration move, with an advanced data security solution that is purpose built for Linux distributions. Data security is no longer an option.
    Listing Thumbnail

    Zettaset Data Security for CentOS Linux Migrations

     Info
    Sold by: Zettaset 

    Overview

    The Zettaset XCrypt Suite data security solution for Linux distributions is a high performance, infinitely scalable, data activity monitoring and advanced encryption solution. XCrypt Insights provides unified visibility and control with advanced monitoring to detect cyberattacks earlier across cloud, hybrid, and edge environments. It is advanced monitoring of data activity across cloud environments, provides actionable intelligence and delivers complete and relevant context, in every alert. Included in the XCrypt Suite, XCrypt Advanced Encryption protects data with a volume layer approach for intelligence, high performance, and scalability to meet any workload requirements and to maximize cyber resilience. Advanced Encryption is ideal for bulk encryption of stored data and operating system volumes. It can be applied to both data at rest volumes and data in motion. The Zettaset software approach to activity monitoring and encryption can be deployed without the need for proprietary appliances, simplifying deployment and making it ideal for cloud environments.

    Highlights

    • Detects cyberattacks faster by monitoring data activity to mitigate threats and improve response efficiency across cloud, hybrid, and edge environments.
    • Improves your data security posture as you migrate from CentOS with an advanced data security solution purpose built for Linux distributions.
    • Protects data at any scale with a volume layer approach to data security for intelligence and high performance, to meet any workload requirement.

    Details

    Sold by

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Rhel 9.2

    Typical total price

    This estimate is based on use of the seller's recommended configuration (t2.small) in the US East (N. Virginia) Region. View pricing details

    $0.325/hour

    Pricing

    Free trial

    Try this product at no cost for 30 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    Zettaset Data Security for CentOS Linux Migrations

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (1)

     Info
    Instance type
    Product cost/hour
    EC2 cost/hour
    Total/hour
    m5.large
    Recommended
    $0.20
    $0.125
    $0.325

    Additional AWS infrastructure costs

    Type
    Cost
    EBS General Purpose SSD (gp2) volumes
    $0.10/per GB/month of provisioned storage

    Vendor refund policy

    No Refund. Contact sales@zettaset.com 

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Log on to AMI using ec2-user credentials . There is a README in /home/ec2-user. This will help in deploying the product. Usage instructions give detailed steps.

    The AMI instance is running RHEL 9.2 OS. All the pre requisites for the product have been installed. For any other modules that may be needed for the application(s) you may deploy may require Red Hat subscription.

    Additional details

    Usage instructions

    Zettaset XCrypt Full Disk Encryption Copyright Zettaset 2018-2023 Version 1.0.15 Last Edited: 10/03/2023

    SSH in to the AMI instance using following credentials ec2-user

    Perform the following steps on the node in your deployment:

    1. Add a password for ec2-user:

      sudo passwd ec2-user Changing password for user ec2-user. New password: Retype new password: passwd: all authentication tokens updated successfully.

      Edit the sshd_config and restart sshd:

      sudo vi /etc/ssh/sshd_config and change all PasswordAuthentication to yes PasswordAuthentication yes

      sudo service sshd restart

    2. Establish ssh trust on the node: Note: A sample /etc/hosts file is provided below: The ip address 172.31.3.66 needs to be replaced with the address got from ifconfig eth0 | grep inet | grep -v inet6

      cat /etc/hosts 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6 172.31.3.66 redhat-9.2 172.31.3.66 node01

      NOTE: We need to have two entries for the node, so that installer can run its checks.

      a. Generate an ssh key for the install user: ssh-keygen

      b. Distribute the key to each target node: ssh-copy-id redhat-9.2 ssh-copy-id node01

    3. Check Firewalld Status and start if required sudo systemctl status firewalld

      sudo systemctl enable firewalld sudo systemctl start firewalld

      Run the command below to check that ports 6666/8789/21800 are open. sudo firewall-cmd --list-all

    4. When deploying this product, you might want to configure the following partitions. This will become the encrypted partition. This requires an extra disk to be added initially.

      sudo mkfs.ext4 /dev/nvme1n1

    5. Check the configuration for running the check and install of Xcrypt.

      cd /home/ec2-user/zettaset/xcrypt-full-disk Check that the sample entries match the AWS node's. e.g The license file should be in the path specified.

      Perform a sanity check on the inventory file. This will confirm that the settings in your file are valid.

      1. install_zts-xcrypt-full-disk.sh -vv -i hosts.inv check

      After the sanity check runs, remove the extra entry in the hosts.inv file i.e: The kmip entry will have only node01 NOTE: This is important. We need to have only one entry here for kmip.

      [kmip] node01

      1. Run the installer install_zts-xcrypt-full-disk.sh -vv -i hosts.inv install

      This will create the encrypted partition.

    Support

    Vendor support

    At Zettaset our goal is to ensure a positive, consistent, and successful customer experience with each one of our advanced data protection solutions. As part of our on-going commitment, Zettaset offers a world-class customer service and support program to effectively complement our industry-leading data security products. Every aspect of our customer service and support program is staffed by expert and highly-trained engineers who have years of experience in cybersecurity and regulatory compliance required. Contact info: Phone:+1-866-561-4981 Email: support@zettaset.com  To learn more about Zettaset XCrypt Suite visit www.zettaset.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to write a review for this product.