An IBM Storwize V7000 customer plans on using the cloud as a target for its encrypted data snapshots. The customer wants to use snapshots as a source for restoring to multiple sites around the world with centralized, automated key management.
How should the technical specialist advise the customer?
Comments