× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Thanks for the clarification.


Denis Robitaille
Chef de service TI – Solution d’entreprise
Infrastructure et opérations

CASCADES CENTRE DES TECHNOLOGIES
412 Marie Victorin
Kingsey falls(Québec) Canada J0A 1B0
Tél : 819 363 6100 Poste :52130
Cell : 819 352 9362


-----Message d'origine-----
De : MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxx> De la part de Jim Oberholtzer
Envoyé : 29 octobre 2018 09:48
À : 'Midrange Systems Technical Discussion' <midrange-l@xxxxxxxxxxxx>
Objet : RE: Tape Backup encryption

<snip>
BRMS also encrypts all the tapes the same, whereas when the tape
library
does it, each tape is encrypted >differently. That only matters if your level of paranoia is quite high. (High paranoia is a good thing when it
comes to computer security)
Does that mean that all BRMS encrypted backup uses the same encryption keys?
If so, where does that key come from? If it comes from BRMS itself, what do you do if it becomes corrupted? You can not restore it from backup since they are encrypted. Or am I misunderstanding.
<//snip>

The key is kept in QUSRBRM library and yes it uses the same key for each backup by partition. You set the key on each partition and the tapes are encrypted accordingly. You must know the passphrase(key) to decrypt any
tapes. One of the things we do is put the appropriate files in a save
file and move that off the system for safe keeping in the event it's needed.
Poor man's SKLM if you will. Basically, the same as your TS3500 from that perspective.

I agree encryption at the device is preferable, but not always achievable within a budget and time constraints for an auditor. I can load the two BRMS pieces, set up the encryption and prove it to the auditor in about 1 hour. And since the encryption is good enough for all but the most paranoid, it's good for many customers. Many start there, then move to device encryption.



--
Jim Oberholtzer
Agile Technology Architects


--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options,
visit: https://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at https://archive.midrange.com/midrange-l.

Please contact support@xxxxxxxxxxxx for any subscription related questions.

Help support midrange.com by shopping at amazon.com with our affiliate link: http://amzn.to/2dEadiD Cascades - ATTENTION: Ce courriel provient de l'extérieur de l'organisation. Ne pas cliquer sur les liens et ne pas ouvrir les pièces jointes sauf si vous reconnaissez l'expéditeur et que vous êtes sûr que le contenu est légitime.
Cascades - CAUTION: This email is from outside the organization. Do not click on links or open attachments unless you recognize the sender and you are sure the content is safe.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.