Encryption License Key Overview
This section describes the Encryption License Key features and specifications.
- Parent Topic
- Encryption License Key
a performance-friendly AES-256-XTS encryption capability on the back-end I/O director. This capability protects data at rest on internal storage media (including disk drives and flash drives) attached to those directors. While many levels of encryption are available to the enterprise, protecting data at rest by using the array-level encryption of the storage system provides the following advantages: causes minimal to no performance impact within your operations, remains transparent to existing host servers and switches, shreds storage media by deleting the encryption key, simplifies key management to reduce the risk of the loss of encryption keys and data, and supports logging of encryption and key management events. In addition, many regulations encourage or require encryption of personally identifiable information (PII) and other sensitive data. Array-level encryption handles this type of data as well.
- Encryption License Key
- Child Topics
- Encryption License Key benefits
- Encryption License Key support specifications
- When are data encryption keys needed
- Primary and secondary data encryption keys
- KMIP key management server support
- Implementing data encryption
- How to encrypt existing data
- Workflow for disabling encryption
- Workflow for changing the encryption key
- Audit logging of encryption events
