16
LTO-6 Half-Height SAS Tape Drive
Introduction
©
c
o
gn
ita
s.
G
e
se
lls
ch
ft fü
r T
ech
n
ik
-D
o
ku
m
en
ta
tio
n
m
b
H
2
0
13
Pf
a
d:
C
:\P
ro
g
ra
m
m
e
\F
C
T
\ti
m
_a
pp
\ti
m
_l
oca
l\w
or
k\PI
C
H
O
L\
O
B
J_
D
O
KU
-1
8
77
8-
00
1.
fm
3.7.1
When should I use encryption?
Your company policy will determine when you need to use encryption. For
example, it may be mandatory for company confidential and financial data, but
not for personal data. Company policy will also define how encryption keys
should be generated and managed. Backup applications that support
encryption will generate a key for you or allow you to enter a key manually.
I
Encryption with keys that are generated directly from passwords or
passphrases may be less secure than encryption using truly random
keys. Your application should explain the options and methods that are
available. Please refer to your application's user documentation for more
information.
3.7.2
How do I enable encryption?
Hardware encryption is turned off by default and is switched on by settings in
your backup application, where you also generate and supply the encryption
key. Your backup application must support hardware encryption for this feature
to work.
3.7.3
What happens if I don't remember the key?
If you are unable to supply the key when requested to do so, neither you nor
Technical Support will be able to access the encrypted data.
This guarantees the security of your data, but also means that you must be
careful in the management of the encryption key used to generate the tape.
W
WARNING!
You should keep a record or backup of your encryption keys and store
them in a secure place separate from the computer running the backup
software.
3.7.4
Does encryption affect tape drive performance?
Hardware encryption can be used with or without compression and without
speed or capacity impact.