Redstor uses state-of-the-art security techniques like TLS protocols and AES encryption to ensure the complete safety of all data that it protects. Our software enables you to confidently recover lost data in just about any situation.
The graphic below illustrates a typical Redstor implementation with data being transferred either over a LAN or to the cloud.
Storage Platform security
The Storage Platform only allows backup client connections that use TLS (1.0, 1.1 and 1.2). Connections with insufficient security will be blocked. We recommend that you configure your connection to disable TLS 1.0 and 1.1 whenever TLS 1.2 is possible to ensure maximum protection against protocol downgrade attacks.
Note: To further improve security on the Storage Platform, a log message pointing out any insecure cipher suites that are still accessible to the Storage Platform’s operating system will be generated daily. For more information, see Article 588.
Backup client security
TLS is used to authenticate the data transfer and to create a secure session between the Enterprise Server Edition (ESE) backup client and the Storage Platform. For backups, restores and archiving, the data is encrypted using the 256-bit AES in Galois Counter Mode (GCM) algorithm prior to being transferred. Data on the Storage Platform is also stored in encrypted form using 256-bit AES (GCM).