12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11: <strong>Brocade</strong> Data Encryption ProductsOne advantage of using encryptino blades is that you do not need tobe concerned with ISLs, since all of the encryption is performed via thebackplane. It is not necessary to connect the hosts or storage devicesinvolved in the encryption process into one of the 16 FC ports on theblade. In fact, encryption will take place even though there are nodevices directly connected into the blade. This is accomplished usingthe frame redirection technology described in “Frame Redirection” onpage 33.<strong>Brocade</strong> Encryption FeaturesThe <strong>Brocade</strong> encryption solution offers several features that wereintroduced in releases of Fabric OS subsequent to the initial release ofthe hardware.The following are the encryption features of the <strong>Brocade</strong> encryptionsolution:• NetApp KM500 Applicance• EMC Data Protection Manager (DPM, formerly RKM)• HP Enterprise Secure Key Manager (ESKM)• IBM Tivoli Key Lifecycle Manager (TKLM)• Thales e-Security keyAuthority (formerly TEMS)• SafeNet KeySecure• Symantec NetBackup• EMC NetWorker• CommVault Data Protection• HP Data Protector• BakBone NetVault• CA ARCserv• Symantec Backup Exec• Microsoft System Center Data Protection Manager• Disk encryption• Tape encryption• Offline, in-place, first-time encryption and rekeying• Online, in-place, first-time encryption and rekeying• High availability (HA) cluster178 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!