Relying on third-party encryption tools results in a lack of awareness of the content and context of your backups. In fact, most data reduction algorithms break when they hit encrypted data streams.
With Veeam, end-to-end encryption is built-in and Veeam data reduction technologies like compression, deduplication and WAN Acceleration maintain their efficiency when used with Veeam encrypted backups.Watch this 25 minute end-to-end encryption feature webinar
For most organizations, a lost password means lost data. You don’t have to be most organizations. With Veeam, end-to-end encryption gives you lost password protection of your encrypted backups without compromising security.
How does it work?
- Each Veeam backup file is encrypted by a randomly generated encryption key.
- Each backup encryption key has two passwords. A backup job password created by the admin and a public key automatically generated behind the scenes by the Veeam Enterprise Manager and pushed out to all backup servers.
- If someone forgets the backup job password, or the admin leaves the company, using a challenge/response system in Enterprise Manager you can still access your data without sacrificing security.
With Veeam’s AES 256-bit encryption, you have the ability to secure your data:
- during a backup, before it leaves your network perimeter
- during movement between components (e.g., proxy to repository traffic), for when data must stay unencrypted at the target
- while your backup data is at rest in its final destination (e.g., disc, tape or cloud), perfect for sending encrypted backups off site using Backup Copy jobs with Built-in WAN Acceleration
You also have flexibility over when and where you choose to encrypt backups. For example, you can leave local Veeam backups unencrypted for faster backup and restore performance, but encrypt backups that are copied to an offsite target, tape or the cloud. You can also protect different backups with different passwords, while actual encryption keys are generated randomly within each session for added backup encryption security.
Get your new ransomware preparedness and recovery bundle!
Step on the learning curve of ransomware preparedness and recovery with the Conversational Ransomware Defense and Survival e-book and bonus webinar!Learn more