Security & Compliance

Your Own AES 256 Encryption Key

What you will learn from this article?

  • What is the AES 256 encryption algorithm?
  • How does this algorithm enhance your security?
  • How uses AES encryption to guarantee the security of your critical data

The majority of cloud providers usually autogenerate keys to secure users’ data. went further and enhanced the protection of its customers’ data with the possibility to set up their personal encryption key. So to say, the backup provider permits enabling the AES 256 encryption with the user’s customized personal encryption key - to stay in line with an organization's security policy. It means that you, as a customer, take full ownership of the encryption of your data.

Also, it is worth mentioning that even the device doesn’t have this information, as it gets the key only during the backup or restore processes. Thus, giving you even better control over your critical data, access, and credentials.

Moreover, the backup vendor allows you to safely keep your encryption key in a security Vault. So that, you can have peace of mind that no one can access your credentials.

Back to Features