Remove 2048 Remove Hardware Remove Strategy
article thumbnail

Transparent Data Encryption (TDE)

Percona

Several key management strategies can be used in an RDBMS, including: Master Key Management: In this approach, a single master key is used to encrypt and decrypt all data in the RDBMS. This key is usually stored in a secure location, such as a hardware security module (HSM).

article thumbnail

SQL Server I/O Basics Chapter #2

SQL Server According to Bob

Restore backups on secondary systems ​​ frequently ​​ to make sure that your complete backup strategy is functioning correctly. Make sure that you ​​ understand any ​​ write-caching strategies ​​ that the utility ​​ uses.

Servers 40