Further backup applications encrypting with AES may not support 256-bit keys.
Also, check the availability of compression: backup software may not compress data prior to encrypting it.
Requirement Method Some Vendors Encrypting a small Backup software CommVault, Veritas, amount of data for encryption EMC-Dantz (and more) on-site or off-site storage Encrypting all data, Backup software CommVault, Veritas, but can't afford to encryption EMC-Dantz (and more) invest much Library Spectra Logic (Library with BlueScale Encryption) Encrypting a lot of Library Spectra Logic (Library with data to be sent BlueScale Encryption) off-site Encrypting data at a Network encryption NeoScale, Decru high-security facility appilance on the network or on disk Table 1.
The issue of encrypting
data at rest is moving to center stage and it has unfortunately become a necessity for today's responsible businesses as the threat of data loss and theft mounts daily.
To test this on the Fibre Channel network we created a small partition for encryption, noting the block range since we were not encrypting
the entire disk.
In addition, with the new ETL Utility, the process of encrypting
large quantities of sensitive information is further streamlined and throughput is increased dramatically.
KeepSecure management functions are centralized through a unified, easy-to-use management console that insulates the security team from the complexities associated with encrypting data across a variety of applications and host platforms.
In the past year our customers have benefited from the ease of use and simplified deployment capabilities in our database encryption solution and now we are extending the same advantages to encrypting data at other points throughout the enterprise.
These keys allow a corporation or law firm to use an encryption key for encrypting
the data and then provide a decryption key to the vendor for use in decrypting and reading the tape data.
In addition, end users require a unified approach to managing storage keys across different encrypting storage devices, including tape drives.
Keystone 'sits in the middle' of the storage infrastructure, providing key management services for both open systems and mainframe encrypting storage devices.
Asigra's Televaulting distributed backup provides that security by encrypting
backup data both 'in-flight' and 'at-rest' in an efficient and cost-effective manner.