As an Information and Communications Technology (ICT) leader with 120 years of expertise, NEC has leveraged its adaptive solutions to enable individuals and enterprises across a wide spectrum of industries to achieve more flexible, secure and responsive work environments.
As an Information and Communications Technology (ICT) leader for 120 years, NEC enables new approaches to how Communications and IT services are delivered and managed through its field-tested expertise.
Combining innovative capability with a rich Communications and IT portfolio, NEC has provided individuals and enterprises with solutions that cover and enable the full spectrum of business processes for new and improved ways of conducting business.
HYDRAstor Encryption At Rest protects data against unauthorized access due to lost or stolen disks or nodes by ensuring the data is encrypted prior to being written to disk.
The HYDRAstor Encryption At Rest offers
Prevents unauthorized access to data on lost, stolen, or broken disks or nodes by encrypting data chunks with AES 256-bit with Federal Information Processing Standard 140-2 validated libraries.
Protects the encryption key from unauthorized access by encrypting the key in disk and allocating the decrypted key in system memory.
Retains the attributes and protection level at both primary and remote site with RepliGrid™ WAN-optimized replication and HYDRAlock™ write-once, read many.
Other Features Include
Deploys encryption functionality into existing HYDRAstor systems easily by license activation and simplifies administration with easy management and monitoring.
Encryption At Rest Compatibility
This software brings robust functionality across the entire HYDRAstor hardware product line.
This includes: HS8-5000 - Scale-out global dedupliation backup storage HS6-5000A - Scale-out grid storage for archive and long-term data HS3-510 - Inline deduplication storage