encryption security decryption key events authentication encrypted policy fingerprint incremental backup overview login authentication security encryption agent network authentication aes encryption business differential backup identity management cryptography access control