Top
Symfoware Server V12.1.0 Cluster Operation Guide
FUJITSU Software

5.3.2 Encryption of Transaction Logs Transferred to the Standby Server

In case the authentication of the standby server is breached so that a malicious user purporting to be the standby server can spoof data, the transaction log data can be encrypted to prevent it from being deciphered. The transparent data encryption feature is used to encrypt the data.

See

Refer to "Protecting Storage Data Using Transparent Data Encryption" in the Operation Guide for details.