Lto-6, Lto-5 And Lto-4 Tape Drives And Encryption; When Should I Use Encryption; How Do I Enable Encryption; Encryption - Lenovo ThinkServe LTO User Manual

Table of Contents

Advertisement

depending upon the severity of the tampering, but no further appended
backups will be possible.
WORM data cartridges are clearly identified by their distinctive, two-tone
cartridge color. They can only be used with LTO tape drives that support
the WORM feature.
To check whether your backup or archive software application supports
WORM cartridges, refer to http://www.tandbergdata.com.
LTO–6, LTO–5 and LTO-4 tape drives and encryption
The LTO-6, LTO-5 and LTO–4 tape drives support hardware encryption.
Encryption is the process of changing data into a form that cannot be read
until it is deciphered, protecting the data from unauthorized access and use.
LTO–6, LTO–5 and LTO–4 tape drives use the strongest version of the
industry-standard 256–bit AES encrypting algorithm to protect your data.
To make use of this feature you need a backup application that supports
hardware encryption.

When should I use encryption?

Your company policy will determine when you need to use encryption. For
example, it may be mandatory for company confidential and financial data,
but not for personal data. Company policy will also define how encryption
keys should be generated and managed. Backup applications that support
encryption will generate a key for you or allow you to enter a key manually.
Note:

How do I enable encryption?

Hardware encryption is turned off by default and is switched on by settings
in your backup application, where you also generate and supply the
encryption key. Your backup application must support hardware encryption
for this feature to work. The software supplied with the tape drive provides
this support. See
suitable backup software.
November 2012
LTO–6, LTO–5 and LTO-4 tape drives and encryption
Encryption with keys that are generated directly from
passwords or passphrases may be less secure than
encryption using truly random keys. Your application
should explain the options and methods that are available.
Please refer to your application's user documentation for
more information.
http://www.tandbergdata.com
for an up-to-date list of other
#
55

Advertisement

Table of Contents
loading

Table of Contents