Skip main navigation (Press Enter).
Log in
Toggle navigation
Log in
Community
Topic Groups
Champions
Directory
Program overview
Rising Champions
IBM Champions group
User Groups
Directory
Benefits
Events
Dev Days
Conference
Community events
User Groups events
All TechXchange events
Participate
TechXchange Group
Welcome Corner
Blogging
Member directory
Community leaders
Resources
IBM TechXchange
Community
Conference
Events
IBM Developer
IBM Training
IBM TechXchange
Community
Conference
Events
IBM Developer
IBM Training
IBM FlashSystem
×
IBM FlashSystem
Find answers and share expertise on IBM FlashSystem
Group Home
Threads
2.2K
Blogs
1.4K
Events
0
Library
50
Members
3.5K
View Only
Back to Library
Data encryption in the storage clusters (SAN and NAS)
Like
Share
Share on LinkedIn
Share on X
Share on Facebook
Sat September 11, 2021 11:37 PM
Ashish Sharma
To maintain security and compliance to end-users data, we need to configure encryption in storage devices.
Use encrypting hardware (drives) or software (volumes) in storage infrastructure. It will protect businesses from the risk of data decryption/ misuse of data by any 3rd party actor(s), even though failed drive sent outside data center/ premises as a part of RMA process.
While new storage site design, prefer the clients to purchase NSE drives. It may involve extra payment, as NSE drives are more expensive than non-NSE drives, but business/ end-users data will be safe and secured and cannot be decrypted without a key, as the encryption key vaulted by the client/ storage owner only.
If a storage infrastructure site is already built and established, then prefer the clients to purchase an NVE license to enable logical volumes for the data encryption.
#PrimaryStorage
#StorageAreaNetworks
#Storage
Statistics
0 Favorited
9 Views
1 Files
0 Shares
4 Downloads
Attachment(s)
NetApp Data ONTAP_Data Encryption_Understanding.pdf
574 KB
1 version
Uploaded - Sat September 11, 2021
Download
Download Document
Please accept the terms of the copyright associated with this attachment before downloading it. Click the link below to read the terms.
Accept
Powered by Higher Logic