Our Partners close more business.

Use these powerful resources to win more business, faster, with less effort.  
Call 877-411-2220 x121 for personal support with any opportunity.

RESET SEARCH

Hosting Quote Estimator

GET a FREE Sandbox or Trial Environment NOW

How To Use This Tool:  

To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc.  You will find common questions and answers grouped together in one record.  Follow the tag links to refine your search.  Supporting downloads and documentation are available, below.

Please login to obtain download access to additional supporting documentation.  Registered users can also contribute to the database.  You can request access by Contacting Us.

© Omegabit LLC, 2023

Enter a Search Phrase or Select a Tag

Content with tag crytographic keys .

Data Encryption

Q:

How is the primary data encrypted?

Do you employ cryptographic mechanisms to protect the confidentiality and integrity of information at rest or in storage?

Do you have a process in place to establish and manage cryptographic keys?


A:

Data encryption is supported as a special requirement in the runtime. All backup and archive storage is encrypted. Typically, it is most practical and efficient to consider satisfying any encryption requirements inside Liferay at the metadata storage level during the application design phase. However, Omegabit is able to accommodate bulk file-system level storage encryption in the runtime on a needs basis.

 

This is documented in Omegabit Internal Operations Wiki



No comments yet. Be the first.

Public and Cryptographic Keys

Q:

Do you have a process in place to establish and manage cryptographic keys?

Do you have a process in place to manage and issue public key certificates via a trusted Certification Authority (CA)?


A:

This is documented in Omegabit Internal Operations Wiki



Add Comment
Posted on 8/11/21 9:26 AM.