BlueCielo Meridian Enterprise 2012 Administrator's Guide | BlueCielo ECM Solutions

You are here: BlueCielo Meridian Enterprise Administrator's Guide > Optimizing performance > Optimizing the server operating system > Understanding the effects of software data encryption

Understanding the effects of software data encryption

The disk subsystems used by Meridian should be as fast as possible. Third-party programs and Windows itself (BitLocker, for example) support data encryption for additional security. However, software data encryption adds overhead to the computer CPUs that will reduce Meridian performance. When Meridian application server security is properly configured as described elsewhere in this guide, direct access to the Meridian stream files (document content) is only permitted for server administrators, the same persons who would administer the data encryption software and have access to unencrypted files. Casual misuse of the Meridian stream files is also obstructed by the fact that the stream folders have 4- or 8-character hexadecimal names, for example, 3D0C or 1FF20BD3, and the document content files all use the same counterintuitive file name with variable 3-character hexadecimal file extensions, for example, CONT.3D2.

All other access to vault documents is only possible through authentication by the Meridian client software and application of the vault security roles. The same is true for the Meridian vault metadata stored in Hypertrieve, SQL Server, or Oracle. Therefore, software data encryption provides no useful additional security and should not be used on folders containing the Meridian database or stream files.

Note    If Local Workspace is enabled, working copies of documents also reside there on the client computers and these principles and guidelines also apply.

Meridian is not routinely tested with software encryption products. However, if software data encryption is a system requirement, it can be accomplished by following these guidelines:

Related concepts

Optimizing the server operating system

Understanding the effects of virtual memory

Understanding the effects of the Windows 3GB switch

Understanding the effects of the Windows userva switch

Understanding the effects of multiple network adapters

Understanding the effects of multiple network protocols

Understanding the effects of software disk compression

Related tasks

Configuring application response


Copyright © 2000-2012 BlueCielo ECM Solutions

www.bluecieloecm.com