To view the video in a larger window, or full screen, click this link.
In many organizations, the security of the data generated and stored across varying systems and platforms is becoming a significant point of concern. The protection of data has traditionally been constrained to businesses where compliance with industry security standards is required, such as healthcare providers (HIPAA), financial accounting systems (SOX), and credit card transactions (PCI). In today's business environments, the protection of data, and the prevention of data loss and theft has now grown beyond these traditional scopes and reaches into many more datacenter landscapes.
HyperFlex clusters can be ordered with self-encrypting disks (SED) which encrypt all of the data stored on them, also known as data-at-rest encryption. In order to configure a HyperFlex cluster for encryption, all of the disks on all of the nodes of the cluster must be SEDs. Since the hardware handles all the encryption and decryption functions, no additional load is placed on the CPUs of the HyperFlex nodes, so encryption is enabled without any reduction in the usable load on the cluster. Storing the data in an encrypted format prevents data loss and data theft, by making the data on the disks unreadable if they are ever removed from the system.
Cisco HyperFlex builds on the SED support of the Cisco UCS platform to enable data-at-rest encryption of all the data stored across the entire HyperFlex cluster. Cisco HyperFlex can enable encryption by using additional cryptographic keys to lock the disks, called Authentication Keys (AK). These keys can be manually created, or for additional security they can be created and managed automatically from a central Key Management System (KSM) already present in your organization. In this video description and demonstration, we walk through the operation of HyperFlex encryption, and show how to enable this encryption using both local keys, and centrally managed keys using a SafeNet KeySecure KMS system from Gemalto.
Hello, Could you check my config template, I just want to make sure that it makes a domain and works fine, I am about to put it on lot of switches. thanks a lot 5k-1#Config T
5k-1(Config-Fex)#Pinning max-links 1
Hi, Could anyone here please help clarify if I can configure either BIOS of Cisco 12G SAS Raid bios to have a standard SATA hard drive access? I am having a Cisco C220 M4 server with Cisco 12G SAS raid controller...
Hi,The APIC EP tracker does not give results when searched with VM name.FYI: Getting results when searched with same IP address.Has anybody tried this ? The tool tip shows as:e.g., 00:50:56:BD:2E:6C, 10.0.0.1 or 2002:50:22:0:50::1, or comp-vm1APIC ve...
I have 2 x 7009 chassis, each have 2 x SUP1 supervisors (NXOS 6.2(16)), 3 x M108X2-12L, 1 x M148GT-11L line cards and 5 x FAB2 fabric modules. These act as the core switches, with VPCs to downstream Nexus 5500s.I need to replace the modules in each 7009 w...
I have taken the following exams:(300-165)(300-175)(300-180)According to the migration tool, it says that with these 3 approved exams it is enough to have the new ccnp Data Center certification of February 2020. So here my question, I really only need to ...