RSTOR takes steps to ensure you are protected from malicious encryption. RSTOR Space supports encrypted connections of your data on the way in through HTTPS protocol via replications, and utilizes data at rest encryption with customer managed keys.  


As the user, you are also able to take steps to limit access to your data using policies that specify the users who can see specific buckets and objects. For more information on how to create policies, please reference our RSTOR Space User Guide. You can also enable both object locking and versioning for an additional level of security.  

Have a question? Contact us!