Upload
veeam-software
View
359
Download
1
Tags:
Embed Size (px)
Citation preview
End-to-end EncryptionComing soon in Veeam® Availability Suite™ v8 and Veeam Backup & Replication™ v8Defining Availability for the Modern Data Center™
Rick VanoverVeeam Evangelist@RickVanover
Russ KerscherVeeam Product Marketing Manager
Presenters:
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
End-to-end EncryptionComing soon in v8!
Agenda:• Common encryption challenges• Encryption: Veeam style• Feature demo
Housekeeping items:This session will be recorded.Please use the Q&A panel in GoToWebinar for questions.See what else is coming in v8! http://go.veeam.com/availability-suite-v8
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Common Encryption ChallengesLack of awareness into data content from 3rd party tools
Password management: remembering which files are encrypted with which files
Lost password = worthless backup
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Encryption: Veeam style
Uses AES 256-bit encryption for maximum efficiency and protection
Secures data:1. at source (during backup) before it leaves your network
perimeter2. in-flight as it is transferred between Veeam components
For when data must stay unencrypted at target (replication or quick migration)
3. at rest, including hardware and software tape encryptionFor sending data off-site using Backup Copy jobs with Built-in WAN
Acceleration
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Encryption: Veeam style
Provides flexibility over when and where you leverage encryption, for example:• Leave local backups unencrypted (for faster backups/restores),
but encrypt offsite backup copies prior to flight• Protect different backups with different passwords
Does NOT negatively affect WAN Acceleration or data reduction
The beauty of everything built-in to one solution!
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Encryption: Veeam style
Lost password protection without compromising security!
*Password loss protection can be disabled
How it works:• Each backup is encrypted by a
randomly generated encryption key
• Each key has 2 passwords1. The backup job password, created by the admin2. A public key, pushed out by Enterprise Manager to
all backup servers
• If the original password is lost, using a Challenge/Response system, you can still access your data without sacrificing security
= encryption
K = encryption key
P = user password
PK = public key
Legend:
K KVBK
P PK
Data Data
© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Questions?Please use the Q&A panel in presentation UI for questions. Presenters will remain on the webinar until all questions are answered.
This session has been recorded and will be posted at www.veeam.com/videos