10
End-to-end Encryption Coming soon in Veeam ® Availability Suite™ v8 and Veeam Backup & Replication™ v8 Defining Availability for the Modern Data Center™ Rick Vanover Veeam Evangelist @RickVanover Russ Kerscher Veeam Product Marketing Manager Presenters:

Encryption coming to Veeam availability suite v8!

Embed Size (px)

Citation preview

End-to-end EncryptionComing soon in Veeam® Availability Suite™ v8 and Veeam Backup & Replication™ v8Defining Availability for the Modern Data Center™

Rick VanoverVeeam Evangelist@RickVanover

Russ KerscherVeeam Product Marketing Manager

Presenters:

© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.

End-to-end EncryptionComing soon in v8!

Agenda:• Common encryption challenges• Encryption: Veeam style• Feature demo

Housekeeping items:This session will be recorded.Please use the Q&A panel in GoToWebinar for questions.See what else is coming in v8! http://go.veeam.com/availability-suite-v8

Common Encryption Challenges

© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.

Common Encryption ChallengesLack of awareness into data content from 3rd party tools

Password management: remembering which files are encrypted with which files

Lost password = worthless backup

Encryption: Veeam style

© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.

Encryption: Veeam style

Uses AES 256-bit encryption for maximum efficiency and protection

Secures data:1. at source (during backup) before it leaves your network

perimeter2. in-flight as it is transferred between Veeam components

For when data must stay unencrypted at target (replication or quick migration)

3. at rest, including hardware and software tape encryptionFor sending data off-site using Backup Copy jobs with Built-in WAN

Acceleration

© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.

Encryption: Veeam style

Provides flexibility over when and where you leverage encryption, for example:• Leave local backups unencrypted (for faster backups/restores),

but encrypt offsite backup copies prior to flight• Protect different backups with different passwords

Does NOT negatively affect WAN Acceleration or data reduction

The beauty of everything built-in to one solution!

© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.

Encryption: Veeam style

Lost password protection without compromising security!

*Password loss protection can be disabled

How it works:• Each backup is encrypted by a

randomly generated encryption key

• Each key has 2 passwords1. The backup job password, created by the admin2. A public key, pushed out by Enterprise Manager to

all backup servers

• If the original password is lost, using a Challenge/Response system, you can still access your data without sacrificing security

= encryption

K = encryption key

P = user password

PK = public key

Legend:

K KVBK

P PK

Data Data

Encryption Demo

© 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.

Questions?Please use the Q&A panel in presentation UI for questions. Presenters will remain on the webinar until all questions are answered.

This session has been recorded and will be posted at www.veeam.com/videos