• Elliott Whitlow (7/2/2013)


    The item that I find is this:

    http://www.symantec.com/connect/blogs/backup-exec-2012-security-improvements

    However, I am unaware of anywhere that the law requires this, where are you?

    CEWII

    We have encryption requirements in the industry I am in, and we need to reasonably assure that all data traffic between devices is "secured" so since we are encrypting server to client, we wanted to make sure all points of transit follow a similar scheme or at least be able to say we researched them to get an idea of what is or isn't securable