Encrypting backup tapes

Backup should be keeping your customer’s data secure as well as safe. Forget to encrypt data written to tapes and they run the risk of having to explain it to the auditor when a courier loses them.

Encrypt at the application level (before it is sent to the backup device) and you only need to encrypt the data you care about, which can make data restoration and validation easier. And if data is encrypted in the application, rather than when it is written to the backup media, it’s less likely to be sent in the clear from the application across the network, which can introduce vulnerabilities elsewhere in the system.

On the other hand, applying granular backup policies to application data can be a complex and gruelling process, because you’re likely to have to build that directly into the server application’s database.

Encrypting at the point of backup gives you two options: an in-line encryption device from a company like CipherMax (, or a system that encrypts directly on the device. The LTO 4 standard for tape drives from the LTO Consortium now includes native AES encryption capabilities, so that the device itself handles backup.

Check how you manage the keys; most encryption software has its own key management capabilities, but with several customers to deal with you’ll want to centralise it. The forthcoming IEEE 1619.3 standard, defining how a key manager sends keys to a device like a tape drive, or an application, promises better separation between the management system and the device using the key.

Link to a Relevant Feature Click here to go to the main feature - Specifying and Supporting Disk Encryption


Share |
Write comment
security image
smaller | bigger



Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010



tools If you're trying to solve connectivity problems at a customer site, you can ask a colleague back at your office to use ping and traceroute to see how the network appears to the outside world; or you can use the tools at to do it yourself. There are tools for looking up Mac addresses and calculating subnet masks too. If you need a more detailed trace, has a pathping tool.
read more


Unified communications


The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources