Controller Based Encryption
The need for protection of sensitive personal information or trade secrets is becoming crucial in safeguarding the interests of any organization. This paper provides an insight in tightening data security for data at rest using methods of encryption and specifically encryption using external array controller based technologies. The purpose of this paper is to educate readers on different configurations of external array controller based encryption and different issues and merits of each. This paper is written for array and server architects, and R&D managers looking to learn more about methods to increase data security and applications of controller based encryption.
PMC-Sierra is a leading provider of broadband communications and storage semiconductors for metro, access, fiber to the home, wireless infrastructure, storage, laser printers, and fiber access gateway equipment. PMC-Sierra offers worldwide technical and sales support, including a network of offices throughout North America, Europe, Israel and Asia. The company is publicly traded on the NASDAQ Stock Market under the PMCS symbol. For more information, visit www.pmc-sierra.com
About the Authors
Peichen Chang is a Senior Product Marketing Engineer responsible for PMC's 8G Fibre Channel, 10G FCoE, and StorClad Encryption storage I/O controllers. Peichen received his BS in Electrical Engineering at Rensselaer Polytechnic Institute and MBA at Oregon State University. He has made many important contributions to PMC-Sierra's Enterprise Storage Division and represents the company in Fibre Channel and data storage encryption standards bodies.
Edward Chan is currently a student at the Simon Fraser University. He is studying computer engineering at the Faculty of Applied Sciences and assisted in the authoring of this white paper under the direction of Mr. Chang.
Amir Janwari is currently a student enrolled in the Computer Science program at the University of Lethbridge. He has been a member of many online groups and communities focused on encryption and systems security. He has done independent research on IT security and related technologies.