Data-at-Rest Encryption uses Self-Encrypting Drive (SED) technology to secure all data stored on the DXi. This includes file data and metadata, configuration files, and the DXi software and operating system. When Data-at-Rest Encryption is enabled, all hard drives in the DXi are paired with the disk controllers using encryption keys. After this, accessing data on the drives requires the same encryption keys and controllers that were used to write the data. This ensures that a drive that is physically removed from the DXi cannot be read using another system or device.
In the digital age, maximizing asset value often means using different storage tiers with different cost and access characteristics for data in different stages of its life.
Enterprise deduplication appliances with the power and performance needed for data centers, multi-site installations, and cloud environments.
Industry's first virtual deduplication appliances for protecting virtual and physical servers using a software-only device—perfect for remote offices.
Scalable disk-backup and replication appliances featuring variable-length deduplication for maximum data reduction and highest value—all powered by StorNext 5.
Compact, scalable deduplication appliances with enterprise performance, replication, and manageability.
Variable-length deduplication typically reduces disk backup capacity by more than 90% and allows existing networks to be used for automated DR protection.