Security and compliance risks to businesses and their data are greater than ever. With the emergence of new compliance regulations, any data loss can adversely impact the bottom line.
The need for encryption
Implementation of an encryption strategy plays a vital role in safeguarding the integrity and availability of your customers’ data and backups, and yet many companies have not yet implemented encryption as part of their backup process. While it’s true that encryption can add layers of complexity to their processes and is likely to increase the time required to successfully complete the backup or restore process, it’s also true—and painful—knowing the window of risk to sensitive data expands as the value of data increases. Some of these risks include:
A backup solution without barriers
- Unencrypted removable media taken offsite for “security”
- Difficulty in tracking theft of a tape and removable media
- Data becoming available to third parties if a tape is lost or left unprotected
For companies who need to find a secure way to protect stored data, it’s time for Veritas Backup Exec. It’s the backup solution without barriers, and is delivered in the way that best fits each of your customers. They choose what to back up, where to store it and how to pay for it. The data remains secure and available at every stage—whether backing up on-premises to the cloud, protecting workloads within the cloud, recovering from the cloud or connecting to on-prem storage.
Backup Exec gives comprehensive protection against external threats. So if the unthinkable happens, critical data is backed up and ready to be recovered, quickly and easily. Here’s how Backup Exec enables your customers to encrypt their data.
Why encryption with Backup Exec?
Backup Exec provides your customers with the ability to encrypt data. Encrypting data, protects it from unauthorized access. Anyone that tries to access the data must have an encryption key.
: When Backup Exec is installed, the installation program installs encryption software on the Backup Exec server and on any remote computers that use a Backup Exec agent.
: By using hardware encryption, the data is transmitted from the host computer to the storage device and then encrypted on the device. Backup Exec manages the encryption keys that are used to access the encrypted data.
Backup Exec supports two security levels of encryption
- 128-bit Advanced Encryption Standard (AES), which enables backup jobs to process more quickly. Hardware encryption using the T10 standard requires 256-bit AES.
- 256-bit AES, which provides a stronger level of security primarily because the key is longer for this.
We’ve given you a lot to chew on. But where can your customer start today? These Veritas-recommended best practices will go a long way to helping your customers maintain secure data in quite a few everyday circumstances:
Closing with confidence
- Restrict access to administration or management systems to privileged users
- Restrict remote access, if required, to trusted/authorized systems only
- Limit the impact of exploit by threats by offering least privilege where possible
- Keep all operating systems and applications updated with the latest vendor patches
- Follow a multi-layered approach to security with both firewall and anti-malware applications
- Deploy network and host-based intrusion detection systems
- Create strong pass phrases that go beyond the minimum
Backup Exec is available for purchase in either perpetual or term subscription licensing, with the level of functionality your customers require—Bronze, Silver or Gold.
If you have questions or want to learn more about how Veritas Backup Exec can help your customers protect data, contact Ingram Micro’s Veritas specialist, Courtney Cobb.