You can specify a variety of encryption algorithms for encrypting tapes. Your organization's security policies determine the level of encryption strength required. Different types of data can require different levels of encryption. For example, if you require FIPS 140-2 compliance, only certain algorithms meet those requirements.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |