Addressing the risk of access to confidential data with data encryption
Research shows that attacks on thousands of business computers are becoming less frequent, with targeted attacks on a single company or even one individual, becoming increasingly common. These attacks require access to this individual or organization’s data.
To protect user data from any unauthorized access, enterprises need to implement appropriate security measures. Controlled access is a partial measure and should form part of addressing security in enterprise information architecture, another one of these measures is reliable and secure data encryption
Backup encryption: The backup and recovery solution you use should automatically encrypt your data. This is an especially important feature when it comes to compliance. Anyone with IT access can access data stored on the server, which is why encryption of user data is vital in preserving data integrity.
Cibecs is a certified Cryptography Service Provider. With Cibecs, the backup data for each user is encrypted using Blowfish 448bit (CBC mode) before being transmitted to the server.
All communication between the User Agent and Continuity Server is encrypted through a secure SSL connection. The backup and restore data is also in an encrypted state while being transmitted therefore providing increased data security.
Cibecs ensures central control over endpoint user data with controlled and customisable access to confidential data. With Cibecs, an encryption key is uniquely generated per user to ensure that access to data remains on a ‘per user’ level.
To access a user’s data requires the uniquely generated encryption key for that user to be entered. This key is safe guarded in the Encryption Key Safe. The Encryption Key Safe safeguards each user’s unique encryption key in the event of a user requiring access to their data.
Cibecs provides the ability for authorized personnel to be granted ‘Security Officer’ rights over encryption keys enabling them to retrieve keys when required. This ensures granular access to confidential information and central control over who can view confidential user data.
Effective encryption ensures that confidential user data can’t be accessed by unauthorised parties.
Want to know more?
Visit our comprehensive Enterprise Data Backup Resource Center