Elliott Whitlow (7/2/2013)
The item that I find is this:http://www.symantec.com/connect/blogs/backup-exec-2012-security-improvements
However, I am unaware of anywhere that the law requires this, where are you?
CEWII
We have encryption requirements in the industry I am in, and we need to reasonably assure that all data traffic between devices is "secured" so since we are encrypting server to client, we wanted to make sure all points of transit follow a similar scheme or at least be able to say we researched them to get an idea of what is or isn't securable