IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
1 - 25 of 209 Matches Previous Page  |  Next Page
Powering the High-Performance Cloud with FlashSystem
sponsored by IBM
WHITE PAPER: Read this white paper to discover an all-flash storage system that seamlessly integrates with high-performance cloud and virtualization platforms and supports numerous ypervisors, including VMware, IBM PowerVM, Microsoft Hyper-V and Citrix Xen.
Posted: 01 Aug 2017 | Published: 30 Jun 2016

IBM

Impact of General Data Protection Regulation on Storage Systems
sponsored by IBM
WHITE PAPER: Examine the impact the GDPR will have on your storage systems, and learn to mitigate the risk of data breach from uncontrolled access with media-level data encryption for flash and legacy storage media, geographically dispersed data, and more. Download now to ensure your organization is GDPR-compliant.
Posted: 31 Jul 2017 | Published: 31 May 2017

IBM

IBM FlashSystem: What Implementation Means for the Future of IT
sponsored by IBM
WHITE PAPER: Can your storage system handle high-performing apps that require ultra-low latency? Access this white paper to learn how flash storage implementation not only affects these apps, but can also bolster infrastructure security to prevent data breaches. Moreover, discover the details of one SSD, IBM FlashSystem, inside.
Posted: 31 Jul 2017 | Published: 31 Dec 2016

IBM

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

3 Data Storage Challenges in the Education Industry
sponsored by Reduxio
WHITE PAPER: In this white paper, learn about the 3 pillars of storage management IT pros working in the education industry need to improve in order to keep up with the rapidly changing IT landscape.
Posted: 21 Jun 2017 | Published: 08 May 2017

Reduxio

Mr. Robot and Today's New Data Protection
sponsored by Reduxio
WHITE PAPER: Read this white paper to learn about a data protection technology that uses point-in-time copying techniques like split-mirror backups and snapshots to keep your company safe from malware that could hold your information hostage.
Posted: 21 Jun 2017 | Published: 09 Jan 2017

Reduxio

The Business Value of NVMe
sponsored by Tegile
WHITE PAPER: Download this resource to closely examine the definition and business value of NVMe, with details on scaling with NVMe/F, implementation use cases like VDI, ERP systems, and Microsoft SQL Server illustrated, and more.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Tegile

Increased Security Through The Use Of Flash-Based SEDs
sponsored by Micron
WHITE PAPER: If you find yourself torn between a strong encryption program, and the storage performance you were promised with an SSD array, click inside and learn about how modern self-encrypting-drives (SED) can do both by encrypting data on the device itself.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Micron

Improved Security, Lower Costs: How Companies Can Benefit From SEDs
sponsored by Micron
WHITE PAPER: Delve into a flash-based SED vs. HDD-based storage comparison with acquisition costs analyzed, and attention paid to stacking up hardware- vs. software-based encryption. Read on to learn how SEDs eliminate time-consuming key management, and more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Micron

The Essential Guide to Storage for DevOps
sponsored by Tintri
WHITE PAPER: New technological innovations have allowed storage environments to be bolstered by DevOps. In this guide learn 5 capabilities to think about when buying your next storage system, how DevOps can help solve common storage issues, and more.
Posted: 16 Mar 2017 | Published: 30 Dec 2016

Tintri

Research Brief: Secure Cloud Storage
sponsored by Iron Mountain
WHITE PAPER: With the explosive data growth, it has become even more important to have the right storage system. As the most important and fastest growing segment of the enterprise IT industry, cloud storage may be the right system for you. Check out this white paper to find answers to key questions that will help you decide if cloud storage is right for you.
Posted: 23 Dec 2016 | Published: 23 Dec 2016

Iron Mountain

Data Protection in Two Dimensions
sponsored by IBM Tectight
WHITE PAPER: Discover a better approach to SSD data protection. Learn how to implement two independent dimensions of data protection, monitor your flash media's health, managed flash failures efficiently and optimize the utilization of all your flash resources.
Posted: 27 Oct 2016 | Published: 01 Jan 2016

IBM Tectight

5 Essentials for Achieving Cloud Archiving Success
sponsored by Mimecast
WHITE PAPER: Learn five essentials for achieving cloud archiving success, including guidance on how to avoid common misconceptions about cloud email archiving, and how to prepare for e-discovery and litigation with a secure storage solution.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Mimecast

Making the Case for "Always Be Testing"
sponsored by QuorumLabs Inc.
WHITE PAPER: Whatever the reason, most businesses will experience at least one instance of system downtime a year. To deal with this contingency, this paper makes the case for an "Always Be Testing" (ABT) approach to DR. Find out how you can realistically implement weekly testing to ensure that your backup and data protection strategy is sound and reliable.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

QuorumLabs Inc.

Top 4 Reasons to Adopt Data Lifecycle Management
sponsored by Iron Mountain
WHITE PAPER: This white paper examines the top 4 reasons why you must focus on deploying data lifecycle management as a strategic initiative. It also explores where and how to use specific solutions, along with the benefits of working with a partner that can offer a comprehensive approach to data lifecycle management.
Posted: 05 Oct 2016 | Published: 31 Aug 2016

Iron Mountain

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER: Flash storage not only provides the performance necessary to run next-generation applications – such as cloud, mobile and social systems, and data analytics – but also provides the security necessary to prevent data breaches. See how your enterprise can boost your competitive advantage by leveraging flash today.
Posted: 01 Jun 2016 | Published: 31 Jan 2015

IBM

Fast Track Containers to Production
sponsored by Diamanti
WHITE PAPER: Discover how to fast track containers to production, increase your scalability, address containerized app requirements with converged infrastructure, enable automatic persistent storage for containers, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Diamanti

Forward Thinking Backup Through Unified Data Protection
sponsored by Veritas
WHITE PAPER: This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.
Posted: 18 May 2016 | Published: 18 May 2016

Veritas

Future Proof your Data Storage with the Hybrid Cloud
sponsored by Equinix
WHITE PAPER: This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Equinix

Transform Backup to Transform Your Business
sponsored by Veritas
WHITE PAPER: This detailed white paper highlights a backup and recovery software that protects a variety of platforms, applications, and infrastructures. Discover how this software can integrate with your infrastructure to provide your enterprise with reliable, consistent data protection and keep your storage secure.
Posted: 27 Jan 2016 | Published: 31 Aug 2015

Veritas

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015

IBM

The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Why Data Deduplication Should Matter to You
sponsored by HPE and Intel® Corporate
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HPE and Intel® Corporate
1 - 25 of 209 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement