Your keys. Your encryption. No exceptions.
Every backup is encrypted with keys you own. Not your vendor's keys. Not shared keys. Yours alone.
Every vendor encrypts your data. None let you hold the only key. Rediacc does.
Illustrative output; actual runs may include extra logs. CLI reference: rdc repo mount
Vendor-managed keys aren't truly yours
Most backup tools encrypt your data — with their keys. That means they can access it. Their employees can access it. A breach on their end exposes your data. If you don't control the keys, you don't control your data.
What does weak encryption governance cost you?
Drag the sliders to match your environment. See the real cost of vendor-managed encryption.
Encryption governance calculator
One command. Total control.
Generate
Run rdc keygen production. Create a 4096-bit RSA key pair that only you hold.
Encrypt
Every backup is sealed with AES-256-GCM using your key. Data is encrypted at rest and in transit — automatically.
Control
Zero-knowledge architecture. Rediacc never sees your key, never touches your plaintext. Only you can decrypt.
Why vendor-managed encryption fails you
Vendor-managed encryption means your vendor holds the keys. They can decrypt your data. Their employees can access it. A breach on their end exposes everything. Rediacc uses customer-held keys with a zero-knowledge architecture — we never see your plaintext or your key.
What you get
Your keys only
You generate them. You store them on your infrastructure. No shared key stores, no vendor access, no trust assumptions.
AES-256-GCM encryption
Authenticated encryption with associated data. Not just encrypted — integrity-verified at every read. Tamper-proof by design.
Zero-knowledge architecture
Rediacc never sees your plaintext. Never touches your key. Even if our codebase were compromised, there's nothing to steal.
Encryption control compared
Most backup tools encrypt your data with their keys. That's not your encryption — it's theirs.
| Capability | Veeam | Rubrik | Commvault | Druva | Rediacc |
|---|---|---|---|---|---|
| Customer-held encryption keys | Via KMS[3] | Via KMS[4] | Via KMS[5] | Via KMS[6] | ✓ |
| Zero-knowledge architecture | ✗ | ✗ | ✗ | ✗ | ✓ |
| Self-service key rotation | Via KMS[7] | Via KMS[8] | Via KMS[9] | Via KMS[10] | ✓ |
| AES-256 encryption at rest | ✓[11] | ✓[12] | ✓[13] | ✓[14] | ✓ |
| Per-repository key isolation | ✗ | ✗ | ✗ | ✗ | ✓ |
| Encryption in transit | ✓[15] | ✓[16] | ✓[17] | ✓[18] | ✓ |
| Self-hosted / your infrastructure | ✓[19] | ✓[20] | ✓[21] | ✗ | ✓ |
Explore Other Solutions
Encryption You Control
Your keys. Your encryption. No exceptions.
Current page Encryption ControlAudit Trail
Every action logged. Nothing hidden.
→ Encryption ControlMigration Safety
Migrate without risking your data
→ Ransomware SurvivalImmutable Backups
Backups that ransomware can't touch
→ Multi CloudCloud Outage Protection
When AWS goes down, you don't
→ Verified BackupsBackup Verification
Every backup verified automatically
→ Development EnvironmentsEnvironment Cloning
Clone production in 60 seconds
→ Preemptive DefenseAI Pentesting
Clone production. Let AI attack it.
→- Thales, "2025 Cloud Security Study," conducted by S&P Global 451 Research, 2025. "Only 8% of organizations encrypt 80% or more of their cloud data." "57% use five or more encryption key managers." cpl.thalesgroup.com
- IBM Security, "Cost of a Data Breach Report 2024," July 2024. "The global average cost of a data breach reached $4.88 million in 2024." newsroom.ibm.com
- Veeam supports external KMS integration for encryption key management including AWS KMS and Azure Key Vault. helpcenter.veeam.com
- Rubrik supports customer-managed encryption keys via external KMS integration including KMIP-compatible servers. docs.rubrik.com
- Commvault integrates with AWS KMS, Azure Key Vault, HashiCorp Vault, and KMIP-compatible key management servers. documentation.commvault.com
- Druva Enterprise Key Management (BYOK) lets customers use their own AWS KMS keys to encrypt backup data. docs.druva.com
- Veeam supports encryption key rotation through KMS integration for compliance with security policies. helpcenter.veeam.com
- Rubrik supports encryption key rotation through its KMS integration for enterprise key management. docs.rubrik.com
- Commvault supports automated encryption key rotation via the Rotate Encryption Master Keys workflow with configurable intervals. documentation.commvault.com
- Druva supports both cloud encryption key and customer-managed AWS KMS key rotation for security compliance. help.druva.com
- Veeam encrypts backup data at rest using AES-256 encryption with hardware acceleration support. helpcenter.veeam.com
- Rubrik encrypts all data at rest using AES-256 encryption with software or hardware-based key management. docs.rubrik.com
- Commvault supports AES-256 encryption at rest with hardware-accelerated AES-NI support for backup data. documentation.commvault.com
- Druva encrypts all data at rest with AES-256 using unique per-customer Data Encryption Keys. help.druva.com
- Veeam encrypts all data in transit using TLS for network traffic between backup components. helpcenter.veeam.com
- Rubrik encrypts all data in transit using TLS 1.2+ between cluster nodes and remote targets. docs.rubrik.com
- Commvault encrypts network traffic in transit using mutual TLS 1.3 with AES_256_GCM_SHA384 cipher suite. documentation.commvault.com
- Druva encrypts all data in transit with TLS 1.2 (256-bit) between customer environment and Druva Cloud. help.druva.com
- Veeam Backup & Replication is deployed on-premises on Windows Server with full customer control over infrastructure. helpcenter.veeam.com
- Rubrik is deployed as on-premises appliances (r6000 series) with integrated compute, storage, and software. docs.rubrik.com
- Commvault supports fully self-hosted on-premises deployments with CommServe, MediaAgent, and Access Node components. documentation.commvault.com