你的密钥,你的加密,没有例外。
每个备份都用你自己的密钥加密。不是厂商的密钥,不是共享密钥。只有你的。
每家厂商都加密你的数据。但没有一家让你持有唯一的密钥。Rediacc 会。
输出仅作示例,实际运行可能有更多日志。 CLI reference: rdc repo mount
厂商管理的密钥并非真正属于你
大多数备份工具加密你的数据——用他们的密钥。这意味着他们可以访问它。他们的员工可以访问它。他们端的泄露会暴露你的数据。如果你不控制密钥,你就不控制你的数据。
弱加密治理花费你多少钱?
拖动滑块以匹配你的环境。查看厂商管理加密的真实成本。
加密治理计算器
一条命令,全面掌控。
Generate
Run rdc keygen production. Create a 4096-bit RSA key pair that only you hold.
Encrypt
Every backup is sealed with AES-256-GCM using your key. Data is encrypted at rest and in transit — automatically.
Control
Zero-knowledge architecture. Rediacc never sees your key, never touches your plaintext. Only you can decrypt.
为什么厂商管理的加密会辜负你
厂商管理加密意味着你的厂商持有密钥。他们可以解密你的数据。他们的员工可以访问它。他们端的泄露会暴露一切。Rediacc 使用客户持有密钥和零知识架构——我们永远看不到你的明文或你的密钥。
您将获得什么
Your keys only
You generate them. You store them on your infrastructure. No shared key stores, no vendor access, no trust assumptions.
AES-256-GCM encryption
Authenticated encryption with associated data. Not just encrypted — integrity-verified at every read. Tamper-proof by design.
Zero-knowledge architecture
Rediacc never sees your plaintext. Never touches your key. Even if our codebase were compromised, there's nothing to steal.
加密控制对比
大多数备份工具用他们的密钥加密你的数据。那不是你的加密——那是他们的。
| 功能 | Veeam | Rubrik | Commvault | Druva | Rediacc |
|---|---|---|---|---|---|
| Customer-held encryption keys | ✗ | ✗ | ✗ | ✗ | ✓ |
| Zero-knowledge architecture | ✗ | ✗ | ✗ | ✗ | ✓ |
| Self-service key rotation | ✗ | ✗ | ✗ | ✗ | ✓ |
| AES-256 encryption at rest | ✓ | ✓ | ✓ | ✓ | ✓ |
| Per-repository key isolation | ✗ | ✗ | ✗ | ✗ | ✓ |
| Encryption in transit | ✓ | ✓ | ✓ | ✓ | ✓ |
| Self-hosted / your infrastructure | ✓ | ✗ | ✓ | ✗ | ✓ |
探索其他解决方案
Encryption You Control
Your keys. Your encryption. No exceptions.
Current page Encryption ControlAudit Trail
Every action logged. Nothing hidden.
→ Encryption ControlMigration Safety
Migrate without risking your data
→ Ransomware SurvivalImmutable Backups
Backups that ransomware can't touch
→ Multi CloudCloud Outage Protection
When AWS goes down, you don't
→ Verified BackupsBackup Verification
Every backup verified automatically
→ Development EnvironmentsEnvironment Cloning
Clone production in 60 seconds
→ Preemptive DefenseAI Pentesting
Clone production. Let AI attack it.
→- Thales, "2025 Cloud Security Study," conducted by S&P Global 451 Research, 2025. "Only 8% of organizations encrypt 80% or more of their cloud data." "57% use five or more encryption key managers." cpl.thalesgroup.com
- IBM Security, "Cost of a Data Breach Report 2024," July 2024. "The global average cost of a data breach reached $4.88 million in 2024." newsroom.ibm.com