Search String: Display: Description: Sort:

Results:

References: [ +subject:/^(?:^\s*(re|sv|fwd|fw)[\[\]\d]*[:>-]+\s*)*\[Networker\]\s+Managing\s+encryption\s+keys\s+for\s+offsite\s+storage\s*$/: 2 ]

Total 2 documents matching your query.

1. [Networker] Managing encryption keys for offsite storage (score: 1)
Author: "Clark, Patti" <clarkp AT OSTI DOT GOV>
Date: Thu, 21 Jul 2011 13:03:40 -0400
While not specifically a Networker question, it comes under the backup management part of the equation. For offsite storage where there is a third party vendor, for example Iron Mountain, what do fol
/usr/local/webapp/mharc-adsm.org/html/Networker/2011-07/msg00117.html (11,792 bytes)

2. Re: [Networker] Managing encryption keys for offsite storage (score: 1)
Author: "STANLEY R. HORWITZ" <stan AT TEMPLE DOT EDU>
Date: Thu, 21 Jul 2011 19:21:35 +0000
We do hardware encryption to LTO-5 tape media for our off-site tapes. The encryption key is burned to a CD, which is locked away in a safe in a building that is separate from where our tape library i
/usr/local/webapp/mharc-adsm.org/html/Networker/2011-07/msg00118.html (13,072 bytes)


This search system is powered by Namazu