SvKMS with Commvault

A simple centralized key manager for Commvault encrypted backups

Leverage KMIP integration to manage Commvault encryption keys in SvKMS

As a leader in the backup and recovery sector, Commvault enables organizations to quickly recover from data loss. Not only do they allow organizations to regularly backup their data, Commvault also enables protection of their backups through encryption. The keys necessary to enable this encryption require an encryption key manager, which can be provided by Commvault themselves or, via KMIP integration, by StorMagic SvKMS.

Why use SvKMS with Commvault encrypted backups?

A common key management best practice that ensures organizations control their data is to separate the encryption keys from the encrypted data - known as the separation of lock and key. Using a third party key manager, such as StorMagic SvKMS to manage the keys used for Commvault encrypted backups, ensures a far greater protection for the encrypted backups with the keys stored and managed elsewhere.

Furthermore, organizations typically have multiple encryption workloads - Commvault encryption could be one of many being used simultaneously to encrypt different silos of data, such as storage repositories and databases. This would result in a complex web of multiple key managers with different interfaces, policies and requirements. Centralizing the management of multiple encryption workloads into a single unified key manager is a far more efficient and secure method for organizations to handle their encryption keys and the entire key management lifecycle.

StorMagic SvKMS, through its adoption of the KMIP standard, enables the smooth integration of many different workloads and applications. Commvault encrypted backups are one of these workloads.

How to integrate Commvault with StorMagic SvKMS

To integrate Commvault encrypted backups with SvKMS, users enable a third-party key management server within the Commvault management console, which allows for the storage and provisioning of encryption keys through StorMagic SvKMS. Once the key management server has been set up, SvKMS sends back a Key ID which is then stored in the CommServe database.

Commvault Integration Guide

As both Commvault and SvKMS support the KMIP standard, integrating both products is a straightforward process.

For a complete step-by-step integration guide for configuring Commvault and SvKMS, complete the form opposite.

By clicking download, you consent to allow StorMagic to store and process the personal information submitted and for StorMagic to contact you via telephone and email in relation to the content requested. StorMagic is committed to protecting and respecting your privacy, and we’ll only use your personal information to provide the products and services you requested from us. You may unsubscribe from StorMagic marketing communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Data Protection Policy.

By clicking download, you consent to allow StorMagic to store and process the personal information submitted and for StorMagic to contact you via telephone and email in relation to the content requested. StorMagic is committed to protecting and respecting your privacy, and we’ll only use your personal information to provide the products and services you requested from us. You may unsubscribe from StorMagic marketing communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Data Protection Policy.

More information on StorMagic SvKMS

StorMagic SvKMS encryption key management goes much further than just providing simple KMIP integration with leading encryption workloads. SvKMS enables organizations to manage all of their encryption keys, wherever they are located, within a secure, flexible management interface. Enterprise-grade features enable the management of the entire key lifecycle, from key creation to key destruction, and all at a surprisingly low cost.