Veritas™ Smart Meter Getting Started Guide

Last Published:
Product(s): NetBackup (8.2, 8.1.2)

Data protection, privacy, and security standards

Veritas is committed to your privacy and your data security. Smart Meter does not provide Veritas any visibility to customer's data content including personally identifiable information. Smart Meter collects limited configuration data that some customers may deem sensitive, such as the host name and IP addresses. Veritas recognizes the sensitivity of this data in the eyes of the customer and upholds stringent practices to secure it. Veritas adheres to the European GDPR rules and regulations. For more information about how Veritas manages customer privacy and our commitment to GDPR refer to the following site:

https://www.veritas.com/about/privacy/

How does Veritas ensure your private information stays private?

Veritas Smart Meter does not collect user or business data. Additionally, Veritas Smart Meter does not collect any data that describes files, databases, and other proprietary information.

Once the data is collected on your local computers, any unique customer information is obscured using a hash algorithm. Veritas Smart Meter obfuscates any fields where you are prompted to enter user information. Policy names and server names are examples of obfuscated data. Veritas uses a cryptographic hash algorithm to mask customer-specific data.

How does Veritas secure the data in transit?

After the data is collected and any unique customer information is obscured, the data is transmitted securely to Veritas using industry standard encryption methods. In addition, all Smart Meter traffic from your network is outbound only.

Smart Meter uses the HTTPS protocol to secure the data in transit. You must configure your firewall to allow HTTPS traffic out of your network to take advantage of Smart Meter. All data is maintained securely on Veritas servers in accordance with Veritas' privacy standards.

Veritas uses the following standards to protect the data that is sent to Veritas:

  • MD5 and SHA256: Hashing algorithms used for obfuscating customer information.

  • HTTPS (SSL/TLS encrypted): Used in data transmission.

How is the data maintained securely at Veritas?

After obfuscation on-site and secure transmission to Veritas, the data is stored in the Amazon S3 cloud. The S3 data is encrypted with AES-256.