Data Management

ETERNUS LT Key Management for Data Backup

Date Added: May 2010
Format: PDF

Three basic data encryption procedures exist: source, software and hardware encryption, whereby the two latter are the most suited for encryption during data backup. In contrast, source encryption is already applied with the file system (e.g. Windows Encrypting File system) or database (Oracle). The disadvantages of this method are losses in performance, increased key management costs, because each system generates its own key, and the difficulty that backup systems can no longer compress encrypted data.