Sie sind hier:
Cloud Server
Basically, we work exclusively with “data at rest” encryption in our shared cloud environment. This means that the data is encrypted on the central storage and therefore there can be no undesired data leakage even if the hard disks are replaced.
In this variant, all authorized users have access to the data, including us as the provider. If you want to exclude this, you also have the option to encrypt the VMs and to generate and manage the keys on a Hardware Security Module (HSM). If you wish, only the customer can have access to the HSM, which means that we as the provider no longer have access to the data.
S3 Synology: Access and Restore of Backups
Synology S3 Backup Configuration
Embed S3 Object Storage in Nextcloud
The Key Factors of Cloud End-to-End Encryption
What is End-to-End Encryption in the Cloud?
TIMEWARP Newsletter
Would you like to be informed about news right away? Then register here for the newsletter: