White Paper/eBook
An in-depth look at the encryption technology
As one of our core pillars, addressing the end-to-end security and privacy of data is a primary requirement of Endpoint Backup. By utilizing our automated key management and encryption technology in conjunction with our unique data deduplication, both efficiency of data deduplication and security of data can be accomplished. This document describes the end-to-end encryption process and encryption key life cycle management.
Related content
Aug 21, 2024
5 Security tips for protecting Carbonite™ Endpoint Backup
Data is your most valuable digital asset. Implementing secure backup policies is necessary to facilitate disaster recovery protocols when adverse events threaten to disrupt operations. Successful backup requires a deep understanding of the different types of data under protection and the urgency of recovering data that users depend on.
Read now
Data backup and recovery
Ransomware and cybersecurity
Dec 19, 2023
Osterman Research - Backup and Recovery to Protect Against Modern Ransomware Attacks
This white paper examines the dynamics of modern ransomware attacks and explores the key requirements that organizations and managed services providers (MSPs) should demand in modern backup and recovery services
Read now
Ransomware and cybersecurity
Data backup and recovery