Monitoring, Tracking & Reporting

Description

In this video, we show you how to view and monitor of all your registered applications, including the volume of encrypts and decrypts for each registered and authorized application, where keys have been assigned and key rotation schedules. You will also be able to see a consolidated view of all activities and how this information can be filtered and exported for reporting, auditing or compliance purposes.