{"id":1280,"date":"2003-12-19T00:00:00","date_gmt":"2003-12-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/19\/decru-ships-the-first-security-appliance-to-support-encryption-for-disk-and-tape\/"},"modified":"2021-12-30T11:39:05","modified_gmt":"2021-12-30T11:39:05","slug":"decru-ships-the-first-security-appliance-to-support-encryption-for-disk-and-tape","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/19\/decru-ships-the-first-security-appliance-to-support-encryption-for-disk-and-tape\/","title":{"rendered":"Decru ships the first security appliance to support encryption for disk and tape"},"content":{"rendered":"<p>With the DataFort T520, Decru adds new options to its tape security product line that already includes DataFort FC520, the first security appliance to support both Fibre Channel storage networks and tape backup.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security is a top concern for IT organisations worldwide and portable media like backup tapes pose unique security challenges.  Tapes are small, easily concealed and frequently entrusted to third parties for offsite storage.  When data is stored in cleartext, insiders, contractors or attackers can easily gain access to sensitive information.<\/p>\n<p>Decru&#8217;s tape security appliances protect data with strong encryption, access controls and comprehensive auditing, ensuring that only authorised users can read sensitive data.<\/p>\n<p>DataFort&#8217;s cryptographic host authentication prevents spoofing attacks, blocking unauthorised server access and enhancing fabric security.<\/p>\n<p>More info: [url=http:\/\/www.securitypark.co.uk\/article.asp?articleid=21945&#038;CategoryID=]http:\/\/www.securitypark.co.uk\/article.asp?articleid=21945&#038;CategoryID=[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1280","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1280"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1280\/revisions"}],"predecessor-version":[{"id":3767,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1280\/revisions\/3767"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}