Listing Thumbnail

    comforte Data Security Platform

     Info
    Deployed on AWS
    The comforte Data Security Platform protects your sensitive data in any state (at rest, in motion, or in use)

    Overview

    The comforte Data Security Platform uses automated discovery to identify sensitive data and provides end-to-end protection for structured and semi-structured data without compromising usability for processing and analytics. With encryption, tokenization, and masking, the platform provides granular levels of auditing and control for regulatory compliance.

    Designed as a support tool for existing customers, this pre-configured AMI image contains the necessary packages and utilities to help you deploy and evaluate our data protection solution. This infrastructure setup is designed to help our support and sales teams guide you through the steps required to implement our solution in managed environments.

    Highlights

    • Data Discovery & Data Classification: Attain comprehensive visibility into data across your network.
    • Data Protection: Ensure data security at-rest, in-motion, and in-use while preserving usability for processing and analytics.
    • Security for AI & Data Analytics: Facilitate secure and compliant data analytics within modern data ecosystems.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu 22.04

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    comforte Data Security Platform

     Info
    Pricing and entitlements for this product are managed through an external billing relationship between you and the vendor. You activate the product by supplying a license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. AWS Subscriptions have no end date and may be canceled any time. However, the cancellation won't affect the status of the external license.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Vendor refund policy

    If things don't work out as expected, you can always contact your comforte representative or reach out to us at https://www.comforte.com/ . General refund policies will be discussed before you acquire a license from us.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    The release notes will be provided by your contact person after you purchase this product.

    Additional details

    Usage instructions

    Important Note: Please be aware that this is a Bring Your Own License (BYOL) product. Before proceeding with its use, ensure that you have obtained the necessary licenses. We strongly recommend contacting one of our representatives, who will provide detailed guidance and assist you in setting up the product on AWS, step by step. If you are interested in SecurDPS but have not yet acquired the required licenses, please reach out to us through our website at comforte.com to get started.

    Installation Steps:

    1. Launch a new EC2 instance based on the securdps-node AMI.
    • Min vCPUs: 4
    • Min Memory: 8GB
    • Create or use an existing SSH key pair to connect to the instance
    1. Connect to the instance via SSH
    • Open an SSH client
    • Locate the private SSH key file used in step 1
    • Connect to the instance via its public IP address, like: ssh -i "<SSH_PRIVATE_KEY_FILE>" ubuntu@<EC@_INSTANCE_PUBLIC_IP_ADDRESS>
    1. Run securdps --help for a brief description of usage and available options.

    You will now have:

    • An EC2 instance configured to create and run libvirt/QEMU VMs.
    • The securDPS Management Utility installed on the EC2 instance, enabling you to:
      • Simplify the creation and management of libvirt/QEMU VMs for the SecurDPS Protection Cluster components.
      • Perform configuration and maintenance tasks on a SecurDPS Protection Cluster.

    Next Steps:

    To proceed, please contact a comforte representative to obtain the following essential items:

    • The SecurDPS ISO file (SecurDPS Protection Cluster application).
    • The SDF file (SecurDPS Protection Cluster configuration file).

    You will also get help with:

    • Creating an SSH key pair for administering the Management Node component.
    • Creating an SSH key pair for accessing data protection services within the Protection Node component.
    • Integrating the public SSH key for data protection services into the SDF configuration file.

    Once all required files are in place you will be able to:

    1. Create/run a new 'libvirt/QEMU' VM for the Management Node component (securdps Management Utility).
    2. Perform the initial configuration of the Management Node (securdps Management Utility).
    3. Initialize the Management Node with the SDF file (securdps Management Utility).
    4. Download a Protection Node ISO file from the Management Node (securdps Management Utility).
    5. Create/run a new 'libvirt/QEMU' VM for the Protection Node component (securdps Management Utility).

    Once the Protection Cluster is up and running, you can proceed with the evaluation process by exploring the various options for integrating data protection services into your cloud infrastructure.

    Upgrade: To upgrade the EC2 instance, you can use the regular upgrade processes:

    1. Run sudo apt-get update && sudo apt-get upgrade -y.
    2. Restart the EC2 instance whenever required.

    In the event of a new release for the SecureDPS Protection Cluster, you will:

    1. Be notified of the release through Comforte's support channels.
    2. Receive the necessary files for the upgrade process.
    3. Proceed with the Protection Cluster upgrade, with full support from Comforte.

    Support

    Vendor support

    Comforte provides customers with product support. Contact comforte directly at support@comforte.com  to open a support case. Paid customers can get support through our website:

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.