Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.14 Security Configuration Guide

PDF

Data-at-rest encryption

The Cyber Recovery software uses a lockbox resource to securely store sensitive information, such as credentials for application resources and databases.

The lockbox securely manages sensitive information by storing the information in an encrypted format. It operates in Federal Information Processing Standards (FIPS) mode. As a result, only FIPS-approved algorithms are available for use.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\