Data Management

ETERNUS LT Key Management for Data Backup

Download Now Free registration required

Executive Summary

Three basic data encryption procedures exist: source, software and hardware encryption, whereby the two latter are the most suited for encryption during data backup. In contrast, source encryption is already applied with the file system (e.g. Windows Encrypting File system) or database (Oracle). The disadvantages of this method are losses in performance, increased key management costs, because each system generates its own key, and the difficulty that backup systems can no longer compress encrypted data.

  • Format: PDF
  • Size: 3846.8 KB