Read Christina%20Coutts%20-%20Tape%20Drive%20Encryption.pdf text version

TSM Symposium September 2007

TSM encryption options:

Using IBM tape hardware encryption

Christina Coutts FTSS Removable Media [email protected]

IBM System Storage

© 2007 IBM Corporation

TSM Symposium September 2007

Security of Data: a Business Imperative

Many government agencies are requiring disclosure of security breaches

­ 32 states in USA have security breach similar legislation,

Source: www.Privacyrights.org

Industry organizations are also increasing scrutiny of security procedures.

­ Source: Payment Card Industry Security Audit Procedures Version V i 1

Over 150 million consumers have been notified of potential security breaches regarding personal information since 2005

­ Source: www.Privacyrights.org

Information is the most valuable property of a company

­ Computer crime grows steadily

2

Tape encryption | Christina Coutts

IBM System Storage

IBM System StorageTM

Other Regulatory Drivers for Encryption

EU ­ Directive on Data Protection of 1995

Implemented by National Legislation p y g Generally Does not require Encryption Generally imposes fines for failure to adequately protect subject information

Payment Card Industry (PCI) Data Security Standard

Applies to all member merchants of Visa, Mastercard, and other credit card companies that store cardholder data. Applies to commerce conducted via retail, phone, mail, and e-commerce channels PCI recommends encryption as "the ultimate mechanism" to protect stored data. VISA Merchants that fail to comply potentially face hundreds of thousands of dollars in penalties, in addition to the costs of notification credit monitoring and new account creation notification, creation.

Basel II

Applies to Large Global & Money Center Banks Requires establishment of separate Capital Accounts restricted from traditional uses like lending , trading, etc. to offset Operational Risk Initiatives (like Data Security) that reduce Operational Risk free up this capital for productive use.

Page 3

© 2007 IBM Corporation

TSM Symposium September 2007

Agenda

Storage security

TSM and data security Encryption overview yp TSM and encryption

­ ­ Client software-based Hardware-based

Encryption implementation in the tape drive

­ ­ Encryption methods LME components

Encryption Key Manager and other SW components Key serving: LTO and TS1120 More information?

4 Tape encryption | Christina Coutts

IBM System Storage

IBM System StorageTM

Storage Security Parameters and settings:

Ensure resources are available to authorised users and trusted networks Ensure resources are unavailable t everyone else E il bl to l

Parameters and settings controlled in:

Organisation's policies Communications protocols Programming Hardware

Page 5

© 2007 IBM Corporation

TSM Symposium September 2007

Securing Data at Rest

1. Establish a Perimeter: Secure Mobile Data

· Enforce password protection / encryption of confidential data on all laptops · Monitoring agents · Implement encryption on all data stored on tape

6

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Securing Data at Rest

2. Strengthen Fortifications Limit Access based on Roles

· Implement table / database level encryption leveraging hardware Crypto Providers · Share keystores & key management environment

7

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Securing Data at Rest

3. Implement DASD Encryption (when available) Complete Protection Initiative

· Secure remaining data files · Secure HDDs for loss of control / process escapes during MA & de-acquisition

8

Tape encryption | Christina Coutts

IBM System Storage

IBM System StorageTM

TSM and Data Security Authentication, Authorization, Access control

Are you who you say you are?

­ Passwords ­ Admin Centre and Web Admin server ­ Firewall support based on TCP/IP port specification

Do you have permission to do, or access, this? Control lists or role-based access.

Protection of data ­ in flight, and at rest g ,

Encryption Cyclic Redundancy Checks Data Retention Protection Data shredding (secure data erase)

Page 9

© 2007 IBM Corporation

TSM Symposium September 2007

Agenda

Storage security TSM and data security

Encryption overview

TSM and encryption

­ ­ Client software-based Hardware-based

Encryption implementation in the tape drive

­ ­ Encryption methods LME components

Encryption Key Manager and other SW components Key serving: LTO and TS1120 More information?

10 Tape encryption | Christina Coutts

IBM System Storage

IBM System StorageTM

What is Encryption?

Transformation of readable, understandable data to a form that is not (cipher text) Transformation is based on a mathematical formula There are formulas for the transformation of different types of data Keys Text Personal Identification Numbers Some advanced functions associated with cryptography are combinations of basic cryptographic functions applied in a specific manner against specific data A number of cryptographic functions are used: DES, AES128, AES256

HELLO!

LIOBOHMMGMLJ

[Example shown uses STEW ( Symmetric Transient Encryption Wave) ] Page 11 © 2007 IBM Corporation

TSM Symposium September 2007

Helps protect data from unauthorised access

Encryption Process Clear or plain text

Key K

Encryption algorithm (e.g. AES)

Cipher Text

( (Encrypted Data) yp )

Decryption Process Cipher Text Encryption algorithm

Key Data that is not encrypted is referred to as "clear text" "Clear t t" i encrypted b processing with a "key" and an " "Cl text" is t d by i ith "k " d "encryption algorithm" ti l ith "

­ Several standard algorithms exist, include DES*, TDES and AES

Clear or plain text

Keys are bit streams that vary in length

­

12

For example AES supports 128, 192 and 256 bit key lengths

*DES, invented by IBM in 1974

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Symmetric Encryption

Same k used to encrypt and decrypt S key dt t dd t Symmetric Keys must be stored and secured against unauthorized access

13

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Asymmetric Encryption

A key pair is used to encrypt and decrypt

­ The key used to encrypt is often referred to as the Public key ­ The Key used to decrypt is referred to as the Private key

The Public key may be made widely available without fear of compromise The Private Key must be secured against unauthorized access Public / Private encryption is widely used for exchange of data between organizations (eMail)

14 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Agenda

Storage security TSM and data security Encryption overview

TSM and encryption yp

­ ­ Client software-based Hardware-based

Encryption implementation in the tape drive

­ ­ Encryption methods LME components

Encryption Key Manager and other SW components Key serving: LTO and TS1120 More information?

15 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

TSM and encryption

TSM Client encryption

­ Encryption in software ­ Performed by client host ­ Keys managed by TSM client or server

PLUS new methods using tape drive hardware: Application Managed Encryption

­ Keys managed by TSM server

Library Managed Encryption

­ Encryption is transparent to TSM ­ Keys managed externally ­ Library hardware provides proxy

System managed encryption

­ Encryption is transparent to TSM ­ Keys managed externally ­ Device driver on server provides proxy

16 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Enabling TSM Client encryption

Set encryption options (dsm.opt, dsm.sys, or Client Server Options)

­ Select data to encrypt

· · · "include.encrypt" "exclude.encrypt" "encryptiontype=aes128" for AES128

TSM Clients

AES128 or DES56

­ Select encryption method

Encryption key is derived from an Encryption Key Password TSM Server

TSM DB ­ "You" supply and save key You

· · "encryptkey=save" "encryptkey=prompt"

­ Key randomly generated and TSM server saves key with meta data

· "enableclientencryptkey=yes"

17

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

TSM client versus hardware encryption

Client Encryption

­ Protects data while being written ("over the wire") ­ Remains encrypted while at rest on-line ­ Remains encrypted while at rest on removable media ­ Hardware vendor agnostic ­ Increased CPU utilization during backup ­ so performance may suffer ­ No compression on tape ­ so backup sizes may double ­ Uses AES128 or DES56 key format ­ Requires software key and management on restore

Hardware encryption

­ No performance overhead at the host server ­ Encryption is transparent to write performance ­ Encryption applied after compression so data will be compressed as normal p ­ Uses AES256 key format ­ Data is not encrypted during write transfer ­ Requires hardware encryption capability and key management on restore

18

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Agenda

Storage security TSM and data security Encryption overview TSM and encryption

­ ­ Client software-based Hardware-based

Encryption implementation in the tape drive

­ ­ Encryption methods LME components

Encryption Key Manager and other SW components Key serving: LTO and TS1120 More information?

19 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

IBM Encryption Capable Tape Drives

Shipped on all new TS1120 drives shipped 9.8.2006 or later

­ Feature Code # 9592 ­ Encryption Capable, Plant installed ­ No charge (NC) feature ­ Identified by label on drive canister

Can be added to existing TS1120 3592E05s by MES Upgrade

­ Feature Code # 5592 ­ Encryption Capable ­ Field ­ CE Installed ­ new hardware and drive microcode

Shipped on all LTO Generation 4 drives

­ All LTO4 have encryption hardware yp ­ No additional charge on drive

So what does having encryption hardware mean?

20 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Encryption in the Tape Drive

Built-in AES 256-bit data encryption engine in every drive Located "below" compression engine g

­ Virtually no performance or capacity impact (<1%) ­ data can be compressed and be encrypted simultaneous t d i lt

FC Port 0 Host Interface DMA Clea Clear Clear Clear clear ar [email protected] 8%w*q03!k3iKm4*^Fj&fgtrSIaasl

ear

Drive Firmware Process or Code Memory

Look-aside decryption & decompression help assure data integrity Preserves performance and compression characteristics

Application Specific Integrated w*q03!k3iKm4Aw^1* Circuit Buffer ECC and Format Encoding Read/Write Electronics Read/Write Head

w*q03!k3iKm4Aw^1*

AES Encryption

AES Decryption

#*4 4msW Clear

Compression Decompression

Clear r

Drive Certificate with Drive's RSA Key

Tape Media

But anyone can put a card in a drive drive...

21 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

IBM Encryption Implementation and Management

Application Managed Application-Managed

(Currently TSM) Policy

Encryption Key Man nager

System-Managed________

( (z/OS, AIX & Solaris) , )_________

Policy

Library-Managed Lib M d

Policy (TS3500,TS3400,TS3100,TS3200,TS3310)

22

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

TSM Application Managed Encryption (AME)

TSM Server

TSM DB

Application provides Policy Engine to determine if data is encrypted

­ Policy set in tape device class DRIVEENCRYPTION=ON|ALLOW|OFF ­ Data access through standard TSM access controls

VOL123

TSM generates e c ypts a d sto es t e S ge e ates encrypts and stores the key in the DB with other meta data

­ Provides interface to key services ­ Associates correct key with file ­ Keys flow to the drive in the clear

VOL123

Not applicable to TSM DB backups, backup set Export tapes or zOS TSM set, tapes, server

23

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

TSM Library Managed Encryption (LME)

Keystore

EKM DB

Policy Mechanisms provided by Library Microcode

­ Library policies for Library Managed ­ DATACLAS in zOS (uses System Managed)

keylabel

keylabel

Encryption Keys provided by external Encryption Key Manager

­ C Communication via IP P i ti i Proxy connection f ti from IBM Tape Library (LME) ­ Key flows authenticated and secured via SSLlike interaction

EKM environment applicable to TSM or NetBack Up Media Server ­ or other applications

JAG001 LTO001

Encryption is "transparent" to TSM (and applications above the library layer).

24

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

AME fits a narrow set of requirements requirements.

You use only TSM for backup and to create Tape

yes no

You have no known requirements for non-TSM environments

yes

no

You have lower security requirements for B2B Data interchange via Tape

yes

no

Implement Transparent Encryption (LME/SME)

You require support for cartridge interchange across different Tape Drive vendors

yes

no

Consider Application Managed Encryption pp g yp

25

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

IBM Tape Encryption Methods

Encryption Method Application System Open System z/OS Library (or Transparent)

(log. Lib or Volser range)

26

Policy y Encrypt?

TSM Devclass Atape/IBMtape Device Driver

Policy y Key Label?

NA Encryption Key Manager (EKM)

Data Key Generation

TSM Encryption Key Manager (EKM) Encryption K E ti Key Manager (EKM) Encryption Key Manager (EKM)

DFSMS Data DFSMS Data D t Class, JCL DD or Class or JCL DD EKM TS3500 (3584) TS3400 (3577) Web Interface TS3500 (3584) TS3400 (3577) Web Interface or EKM

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Library Managed Encryption ­ components summary

TSM server

Supports AME or SME

Keystore

HW or SW based Stores keys

Crypto Services

HW or SW based Generates keys

TS1120 or LTO4

Provides encryption card hardware

Encryption Key Manager

Free IBM program Run in IBM JRE Runs on server of your choice Manages key distribution EKM management for LME or S SME

IBM Tape Library

Supports LME

EKM

27

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Agenda

Storage security TSM and data security Encryption overview TSM and encryption

­ ­ Client ft Cli t software-based b d Hardware-based

Encryption implementation in the tape drive

­ ­ Encryption methods LME components t

Encryption Key Manager and other SW components

Key serving: LTO and TS1120 More information?

28

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Encryption Key Manager Overview

· Runs in IBM Java Runtime Environment (JRE) · Supplied free from IBM · Does not perform any crypto operations itself

Encryption Key Manager (EKM)

· Config File tells EKM how to run. run ­Where Keystore is located ­Where Drive Table is located ­Default key labels Config File Drive Table · Drive Table contains list of valid drives

Keystore K t

· Hardware or Software based · Stores certificates and keys

C ypto Se ces Crypto Services Provider

· Hardware or Software based · Generates Data Keys (DK) · Wraps/Unwraps/Rewraps DKs IBM System Storage

29

Tape encryption | Christina Coutts

IBM System StorageTM

The Transparent Encryption solution: assembled from a p yp combination of existing and new components.

Key Administration Component Authorization Component Library Encryption Policy Component

Crypto Provider Component

Key Distribution Component

Embedded Crypto Provider Component p Key Store Component Existing C E i ti Component t

Page 30

New C N Component t

© 2007 IBM Corporation

IBM System StorageTM

EKM Environment components run together in a single server image and may support Centralized Key Management .

Encryption Key Administration Authorization Component

May reside on a different server or different platform than the server connected to the Tape Drive. Does not have to be implemented in a dedicated system or LPAR. May reside in a different location th th t l ti than the tape drive. di Implemented on standard server platforms. p

Crypto Provider

Key Store Component

IBM EKM Key Distribution Component p

Key Store file

Config File

Drive Table

EKM Environment

© 2007 IBM Corporation

Page 31

TSM Symposium September 2007

Encryption Keystore

Maintained on server or in hardware crypto device Contains key label, public keys and private keys Populated by self generated or imported certificates Example:

Key Label Acme Offsite BP RR Public Key 12345... 98765... Private Key abcde... Not Available

32

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Supported KeyStores

Distributed

­ JCEKS (file based) ­ PKCS11IMPLKS (PKCS11 hardware crypto)

I5

­ JCEKS (file based) ( ) ­ IBMi5OSKeyStore (I5 platform capabilities)

z/OS

­ ­ ­ ­ JCEKS (file based) JCE4758KS/JCECAAKS (ICSF Secure hardware) JCE4785RACFKS/JCECCARACFKS (RACF with secure hardware) ( ) JCERACFKS (RACF/SAF)

33

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Agenda

Storage security TSM and data security Encryption overview TSM and encryption

­ ­ Client software-based Hardware-based

Encryption implementation in the tape drive

­ ­ Encryption methods E ti th d LME components

Encryption Key Manager and other SW components

Key serving: LTO and TS1120

More information?

34 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

IBM uses both methods for secure key exchange

Public Key Symmetric Key

The same key is used to encrypt and decrypt the data. Implementation requires exceptional focus on securing access to the key. y p y p Usually deployed within an enterprise or within a layered architecture using asymmetric protection for key exchange. Preferred for high data volumes because they are more efficient. efficient IBM Solution uses Symmetric AES256 Keys for Data Keys

Private Key Key Pair

Pairs of different, mathematically related keys are used to encrypt & decrypt data data. The "Public" key may be made widely available The "Private" key is must be secured Widely used as the outer layer of an encryption architecture to protect keys. IBM Solution uses Asymmetric RSA2048 Keys for Key-Encrypting Keys (KEKs)

*Name of the three mathematics Rivest, Shamir and Adleman

35

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Putting it all together... together

36

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Encryption Key Generation and Communication: How is it such a secure system?

1

Drive requests data key sending its own private key certificate Load cartridge specifying encryption

2

Encryption Key Manager ( (EKM) )

Config File Drive Table

4

Key manager transmits both encrypted data keys to tape drive

3

Key manager generates data key and encrypts with 2 different "public" keys: first with the drive's key and second with the data's policy key

5

Drive decrypts one key, writes encrypted data, discards key. key

6

Drive writes second encrypted key to the cartridge

JAG001

37

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

TS1120 Encryption Process - summary

Clear Text DK(Data) ( )

(Symmetric)

Cipher Text T t Encrypted Tape EEDK EEDK

DK

KEK(DK) KEK(DK) KEK KEK

(Asymmetric)

DK ­ Data Key (Symmetric) KEK ­ Key Encrypted Key (Asymmetric) EEDK ­ Externally Encrypted Data Key

38 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

TS1040 (LTO) Encryption Process ­

Clear Text DK(Data)

(Symmetric)

Cipher Text

TS1040 Encrypted Tape

DK

DK ­ Data Key (Symmetric)

· Encryption Process Defined by T10 Standard

39 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Advice on working with keys/certificates

Don't lose your (public/private) keys and certificates Don't leave your (public/private) keys and certificates lying around Make sure you backup your (public/private) k ( bli / i t ) keys and certificates d tifi t

40

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Agenda

Storage security TSM and data security Encryption overview TSM and encryption

­ ­ Client software-based Hardware-based

Encryption implementation in the tape drive

­ ­ Encryption methods E ti th d LME components

Encryption Key Manager and other SW components Key serving: LTO and TS1120

More information?

41 Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

TSM Resources

TSM manuals on the internet - Tivoli Information Centre

­ http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp? toc / toc=/ com.ibm.itstorage.doc/toc.xml

TSM support website pp

­ http://www..ibm.com/software/sysmgmt/products/support/ IBMTivoliStorageManager.html

42

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Other IBM Resources

Java Encryption Key Manager Support Page

­ http://www-1.ibm.com/support/docview.wss?&uid=ssg1S4000504

White Papers

­ TS1120 Performance with Encryption ­ TS1120 Encrypting Data ­ TS3500 Library Managed Encryption

Redbook

­ IBM System Storage TS1120 Tape Encryption: Planning, Implementation, Implementation and Usage Guide (SG24-7320) (SG24 7320)

TSM Encryption Overview Presentation

­ http://w3103.ibm.com/software/xl/portal/viewcontent?type=doc&srcID=XW& docID=H800739N06088R56

43

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

IBM Tape Encryption Documentation

Library

­ ­ ­ 3584 Intro and Planning Guide - GA32-0469 3584 Operator's Guide - GA32-0468 EKM Intro, Planning, and Users Guide - GA76-0418

System

­ ­ ­ ­ ­ 3584 Intro and Planning Guide - GA32-0469 358 Operator's Guide G 3 0 68 3584 Ope ato s Gu de - GA32-0468 EKM Intro, Planning, and Users Guide - GA76-0418 IBM Tape Device Driver Install and Users Guide - GC35-0154 DFSMS Software Support for IBM TotalStorage Enterprise Tape Drive TS1120 ( 3592 ) - SC26-7514

Application

­ ­ ­ 3584 Intro and Planning Guide - GA32 0469 GA32-0469 3584 Operator's Guide - GA32-0468 TSM 5.4 Admin Guide - GC32-0768

· TSM 5.3.4 Readme interim 534

44

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Other Resources

Cryptography Decrypted ­ Mel and Baker, 2001 Privacy Rights Clearinghouse ­ www privacyrights org www.privacyrights.org Consumer Union http://www.consumersunion.org/campaigns/Breach_laws_May05.pdf p g p g _ _ y p

California Department of Consumer Affairs ­ "Recommended Practices on Notification of Security Breach Involving Personal Information"

http://www.privacy.ca.gov/recommendations/secbreach.pdf

National Institute of Standards and Technology N ti l I tit t f St d d dT h l

http://csrc.nist.gov/publications/nistpubs

45

Tape encryption | Christina Coutts

IBM System Storage

TSM Symposium September 2007

Thank you IBM System Storage

© 2007 IBM Corporation

TSM Symposium September 2007

Trademarks

The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: AS/400, DBE, e-business logo, ESCO, eServer, FICON, IBM, IBM Logo, iSeries, MVS, OS/390, pSeries, RS/6000, S/30, VM/ESA, VSE/ESA, Websphere, xSeries, z/OS, zSeries, z/VM The f ll i Th following are t d trademarks or registered t d k i t d trademarks of other companies k f th i Lotus, Notes, and Domino are trademarks or registered trademarks of Lotus Development Corporation Java and all Java-related trademarks and logos are trademarks of Sun Microsystems, Inc., in the United States and other countries LINUX is a registered trademark of Linux Torvalds UNIX is a registered trademark of The Open Group in the United States and other countries. Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation. SET and Secure Electronic Transaction are trademarks owned by SET Secure Electronic Transaction LLC. Intel is a registered trademark of Intel Corporation * All other products may be trademarks or registered trademarks of their respective companies. NOTES: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be g p given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. g p p q p IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. References in this document to IBM products or services do not imply that IBM intends to make them available in every country. Any proposed use of claims in this presentation outside of the United States must be reviewed by local IBM country counsel prior to such use. The information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those non-IBM sites Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.

47

Tape encryption | Christina Coutts

IBM System Storage

Information

47 pages

Report File (DMCA)

Our content is added by our users. We aim to remove reported files within 1 working day. Please use this link to notify us:

Report this file as copyright or inappropriate

157541


Notice: fwrite(): send of 204 bytes failed with errno=104 Connection reset by peer in /home/readbag.com/web/sphinxapi.php on line 531