Evaluating Storage Security Solutions: Considerations and Best Practices for Securing Sensitive Data
sponsored by Decru, a NetApp company

Recent studies by Gartner and other research organizations estimate the cost of a data security breach at roughly $90 per customer record compromised, including notification costs, credit reporting services and administrative time.

The purpose of this document is to provide guidance into some of the factors you should consider when evaluating storage security technology and solutions. As with any security project, acquiring technology is not the only step to properly protecting your data. Part of this process should include an evaluation of the current processes and security controls in place, such as physical access controls, environmental controls and administrative controls.

As encryption technologies proliferate, learn what you need to know to pick the right solution for your organization. While there is no single set of requirements that applies to all organizations, this document can provide some baseline considerations.
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement