Overview
The comforte Data Security Platform uses automated discovery to identify sensitive data and provides end-to-end protection for structured and semi-structured data without compromising usability for processing and analytics. With encryption, tokenization, and masking, the platform provides granular levels of auditing and control for regulatory compliance.
Designed as a support tool for existing customers, this pre-configured AMI image contains the necessary packages and utilities to help you deploy and evaluate our data protection solution. This infrastructure setup is designed to help our support and sales teams guide you through the steps required to implement our solution in managed environments.
Highlights
- Data Discovery & Data Classification: Attain comprehensive visibility into data across your network.
- Data Protection: Ensure data security at-rest, in-motion, and in-use while preserving usability for processing and analytics.
- Security for AI & Data Analytics: Facilitate secure and compliant data analytics within modern data ecosystems.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
If things don't work out as expected, you can always contact your comforte representative or reach out to us at https://www.comforte.com/Â . General refund policies will be discussed before you acquire a license from us.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
The release notes will be provided by your contact person after you purchase this product.
Additional details
Usage instructions
Important Note: Please be aware that this is a Bring Your Own License (BYOL) product. Before proceeding with its use, ensure that you have obtained the necessary licenses. We strongly recommend contacting one of our representatives, who will provide detailed guidance and assist you in setting up the product on AWS, step by step. If you are interested in SecurDPS but have not yet acquired the required licenses, please reach out to us through our website at comforte.com to get started.
Installation Steps:
- Launch a new EC2 instance based on the securdps-node AMI.
- Min vCPUs: 4
- Min Memory: 8GB
- Create or use an existing SSH key pair to connect to the instance
- Connect to the instance via SSH
- Open an SSH client
- Locate the private SSH key file used in step 1
- Connect to the instance via its public IP address, like: ssh -i "<SSH_PRIVATE_KEY_FILE>" ubuntu@<EC@_INSTANCE_PUBLIC_IP_ADDRESS>
- Run securdps --help for a brief description of usage and available options.
You will now have:
- An EC2 instance configured to create and run libvirt/QEMU VMs.
- The securDPS Management Utility installed on the EC2 instance, enabling you to:
- Simplify the creation and management of libvirt/QEMU VMs for the SecurDPS Protection Cluster components.
- Perform configuration and maintenance tasks on a SecurDPS Protection Cluster.
Next Steps:
To proceed, please contact a comforte representative to obtain the following essential items:
- The SecurDPS ISO file (SecurDPS Protection Cluster application).
- The SDF file (SecurDPS Protection Cluster configuration file).
You will also get help with:
- Creating an SSH key pair for administering the Management Node component.
- Creating an SSH key pair for accessing data protection services within the Protection Node component.
- Integrating the public SSH key for data protection services into the SDF configuration file.
Once all required files are in place you will be able to:
- Create/run a new 'libvirt/QEMU' VM for the Management Node component (securdps Management Utility).
- Perform the initial configuration of the Management Node (securdps Management Utility).
- Initialize the Management Node with the SDF file (securdps Management Utility).
- Download a Protection Node ISO file from the Management Node (securdps Management Utility).
- Create/run a new 'libvirt/QEMU' VM for the Protection Node component (securdps Management Utility).
Once the Protection Cluster is up and running, you can proceed with the evaluation process by exploring the various options for integrating data protection services into your cloud infrastructure.
Upgrade: To upgrade the EC2 instance, you can use the regular upgrade processes:
- Run sudo apt-get update && sudo apt-get upgrade -y.
- Restart the EC2 instance whenever required.
In the event of a new release for the SecureDPS Protection Cluster, you will:
- Be notified of the release through Comforte's support channels.
- Receive the necessary files for the upgrade process.
- Proceed with the Protection Cluster upgrade, with full support from Comforte.
Support
Vendor support
Comforte provides customers with product support. Contact comforte directly at support@comforte.com to open a support case. Paid customers can get support through our website:
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.