Tape Media

Tape Drives

Removable Disk Storage

Imation RDX

Imation RDX Bundles

Tandberg Data RDX QuikStor

Tandberg Data RDX QuikStation

Tandberg RDXLock WORM

Quantum RDX

HP RDX Removable Disk

HP RDX+ Bundles

IBM RDX

Dell RD1000

Quantum SuperLoader 3

Quantum Scalar i40 Scalar i80

Quantum Scalar i3 LTO

Overland NEO Tape Libraries

Overland NEOs StorageLoader

Overland NEOs T24 Loader

Overland NEOs T48 Library

Overland NEOxl 40 Series

Overland NEOxl 80 Series

Overland NEO Agility LTFS

Tape Drive Autoloaders

HP StoreEver Tape Libraries

HP StoreEver MSL3040

Tandberg Data Storage Library

Qualstar Q8 Tape Autoloader

Qualstar Q24 Tape Autoloader

Qualstar Q48 Tape Autoloader

Qualstar Q40 Tape Library

Qualstar Q80 Tape Library

Qualstar Tape Libraries

Overland Storage NEO S

NAS Storage

SnapServer NAS

SnapServer XSD 40 NAS

SnapServer XSR NAS Series

SnapServer XSR 40 NAS

SnapServer XSR 120 NAS

SnapServer DX DynamicRAID

SnapServer DX1/DX2 Bundles

SnapScale X2 Clustered NAS

SnapScale X4 Scalable NAS

Snap Server Support

Snap Server Software

G-Technology Storage

Pegasus RAID Storage for MAC

Pegasus2 RAID Thunderbolt

SnapSAN S1000 Storage Array

Nexsan Storage

Software Backup Novastor

Adaptec SCSI HBA Cards

ATTO SAS/SATA/FC HBA

ATTO ExpressSAS RAID

ATTO 10GbE NIC Cards

iSCSI/ FC HBA Cards

SATA/ SAS HBA Cards

Cables & Terminators

Barcode Labels

Turtle Storage Cases

HP Toner Cartridges

Imation Defender Flash Security

Repair Services

Reconditioned Tape Drives


Custom Sequence Barcode Labels for all your Tape Media - DLT, SDLT AIT and LTO FREE LTO BARCODE LABELS

HP LTO-7 Tape Media 6TB Native 15TB Compressed

mTape LTO-7 with Thunderbolt Connectivity for MAC

Browse by Manufacturer
Mailing Lists


Encryption Can Create Stormy Weather in the Cloud

Regulatory compliance requires some businesses to control the keys by which they encrypt their data. Other organizations simply don't want to lose control of their information. However, if an organization wants to use a cloud provider's services, it can allow a provider to access its keys. Encryption still takes place in the cloud, but it's done with keys managed by the customer.

Encryption has received a lot of attention lately as a solution to the growing data breach problem, but one of the hang-ups dogging the technology has been its ability to play nice in the cloud.

That's especially true if an organization wants to control the keys by which its data is scrambled and use services offered by a cloud provider beyond simple storage.

For example, if a cloud provider can't decrypt a client's data, it could break the provider's antivirus, data loss prevention, file preview and text indexing functions, as well as pose performance challenges.

If the cloud provider can't decrypt your data, the cloud just becomes a dumb bucket.

That's why cloud service providers in the past have had access to users' data encryption keys. As long as a user trusted their provider, that approach was acceptable, but that's no longer the case for many organizations.

Trust But Keep Keys

Compliance with regulations requires some businesses to control the keys by which they encrypt their data. Other organizations just don't want to lose control of their information.

However, if an organization wants to use a cloud provider's services, it can allow a provider to access its keys. Encryption still takes place in the cloud, but it's done with keys managed by the customer.

From a security perspective, though, that solution is imperfect. A rogue employee of the cloud provider could abuse those key privileges to peek at, or leak a customer's data. The solution also opens the door for lawyers or government authorities to snatch the data.

Those authorities usually obtain data from a provider through a civil or criminal subpoena. As long as there isn't a gag order attached to the subpoena -- a rare occurrence except in national security cases -- a customer with control of its encryption keys has a chance to protect their data.

After we receive a subpoena, we inform the customer that we've received it, at which time the customer can deny us access to its encryption keys, If they do that, the only thing we could hand over to the courts is encrypted data.

In the instances where we're served with a subpoena for data with a gag order, there's pretty much nothing we can do but turn over decrypted data without telling the customer.

Search
Shopping Cart
Your cart is empty.

Tandberg Data RDX Quikstor Removable Disk Cartridges

RDX 10 Pack Promotion - celebrating 10 Years of RDX Technology

LTO Tape Drives for Rent - LTO-7 and LTO-8 Thunderbolt or SAS

Quantum Scalar i3 LTO-8 is Available and Shipping

FREE LTO Cleaning Cartridge FujiFilm

Free Shipping UPS Ground - $500 min. order


Repair Services - 6 Month Warranty Fast Turnaround

Outlet Center - Refurbished Tape Drives - 6 Month Warranty