Search

1 to 2 of 2
Sort by

Blog Entry
How to have granular and selective secure data at rest and in motion for workloads

Acknowledgement: Thanks to Asmahan Ali , Kumaran Rajaram, & Carl Zetie for their inputs. In an organization there can be different workloads requiring different security posture. As an example, one of the workloads is a high performance computing workload dealing with non-sensitive data...

SANDEEP PATIL's profile image

Blog Entry
Spectrum Scale: Which Filesystem Encryption Algo to Consider ?

When using Filesystem Encryption for Spectrum Scale, "which encryption algorithm should I use?" is a question that often comes to mind. Spectrum Scale supports the following list of algorithms as of the 5.0.3 release: (as described in https://www.ibm.com/support/knowledgecenter/en/STXKQY 5...

SANDEEP PATIL's profile image