StorMagic Technical Pre-Sales Engineer, Steve Bettison, recently produced a new series of training videos for our customers and partners. Within this series, Steve demonstrates how to perform certain actions in the setup, configuration, and general operation of our software products — SvSAN, SvKMS, and ARQvault.

The first set of videos in this ‘How-To’ series cover training demonstrations for SvSAN, our virtual SAN solution. You can learn more about each of the tutorials we’ve covered thus far and access the YouTube training videos, through the following blog posts:

Up next in our ‘How-To’ series, Steve covers how to set up key management servers in SvSAN and encrypt SvSAN targets.

How to Setup Key Management Servers in SvSAN

In this next video, Steve demonstrates how to point virtual storage appliances (VSAs) to a key management server (SvKMS). He explains how to set up encryption workflows, to enable encryption of VMFS data stores within a cluster, to make them more secure.

How to Encrypt SvSAN Targets

The next video is a follow-up from the previous on setting up key management servers in SvSAN. Now that Steve has demonstrated how to point VSAs to key management servers and establish a trusted relationship between SvKMS and SvSAN, he will demonstrate how to encrypt SvSAN targets.

Stay tuned for additional blogs from our ‘How-To’ training series. Future videos are in the works for SvKMS, our encryption key manager, and ARQvault, our digital asset management solution. Click here to access the entire SvSAN ‘How-To’ series YouTube playlist.

Subscribe to receive the latest updates and articles from StorMagic:

By clicking subscribe above, you consent to allow StorMagic to store and process the personal information submitted and for StorMagic to contact you via telephone and email in relation to your request. StorMagic is committed to protecting and respecting your privacy, and we’ll only use your personal information to provide the products and services you requested from us. You may unsubscribe from StorMagic marketing communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Data Protection Policy.