IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
1 - 25 of 225 Matches Previous Page  |  Next Page
File Sync and Share: There’s Too Much at Stake to Compromise
sponsored by Hitachi Data Systems
WHITE PAPER: Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Better Together: Security and Collaboration with Backup and Box
sponsored by Code42
WHITE PAPER: This white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Code42

Flash Storage Drives New Efficiencies in Government
sponsored by Pure Storage
WHITE PAPER: Government agencies' existing storage infrastructures often can't keep up with the need to store more and more data, because they aren't scalable or fast enough. This white paper details how these agencies' are using flash storage to address the major pain points of performance, manageability and cost prevalent with traditional storage.
Posted: 15 Sep 2016 | Published: 29 Jul 2016

Pure Storage

SAP HANA® Backup and Recovery using Pure Storage® Snapshots
sponsored by Pure Storage
WHITE PAPER: This paper covers the necessary steps to take a snapshot of a SAP HANA® instance for backup purposes. It also explains how to restore the database from the snapshot.
Posted: 12 Sep 2016 | Published: 31 Jul 2016

Pure Storage

Choosing the Right Public Cloud for Better Data Protection
sponsored by Dell, Inc.
WHITE PAPER: Integrating infrastructure-as-a-service (IaaS) and data protection software can help your enterprise solve the complexity and cost challenges of protecting data. Discover what public cloud capabilities and data protection software capabilities your enterprise should focus on when choosing a solution for your needs.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Dell, Inc.

Protecting Critical Data in Virtual Environments
sponsored by IBM
WHITE PAPER: VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.
Posted: 25 Aug 2016 | Published: 31 Dec 2015

IBM

Converged Data Protection for Continuously Available Applications
sponsored by NTT ICT
WHITE PAPER: Learn how to combine the availability of instant local and remote array-based snapshots with cost efficient disk-based backup, in order to provide multiple recovery points and rapid data restore times. Read on to examine a centralized recovery manager that maintains constant app availability.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection
sponsored by NTT ICT
WHITE PAPER: This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Application-managed Data Protection for HPE 3PAR StoreServ Storage
sponsored by NTT ICT
WHITE PAPER: In this white paper, examine the benefits of combining backups and snapshots in application-managed, storage-integrated, end-to-end data protection. Read on to simplify your evolving data environment, bolster backup windows and recovery time, and access multi-streaming support.
Posted: 03 Aug 2016 | Published: 03 Aug 2016

NTT ICT

Extend Your Storage Options without Compromising on Security, Reliability
sponsored by BT
WHITE PAPER: Cloud-based object storage ensures data delivery, provides enhanced security and durability that cloud storage solutions typically do not offer. Discover the benefits your enterprise can reap with this storage solution, including easy data migration, automated data replication, and more.
Posted: 29 Jul 2016 | Published: 31 Dec 2014

BT

Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Signiant, Inc.

The Business Value of Data Deduplication
sponsored by Richardson Eyres
WHITE PAPER: Discover a data deduplication system that can dramatically improve backup, recovery, and archiving processes. Explore the benefits your enterprise can achieve with one data deduplication system, including reduced backup costs, simplified backup and recovery operations, increased flexibility, and more.
Posted: 29 Jun 2016 | Published: 30 Sep 2015

Richardson Eyres

Flash Revelations From 1,000 Storage Users: Workload Performance and Adoption Sentiment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how 1,000 expert storage users responded to the question, "What surprises have you experienced since you started deploying flash storage in your organization?" and assess how well flash pairs with VDI, big data, Microsoft SQL Server, and more.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

Hewlett Packard Enterprise

Best Practices in VDI Implementation in Healthcare Environments
sponsored by Pure Storage
WHITE PAPER: While VDI appears ideal for the healthcare industry, its expensive cost and impact on current security leave many reluctant to adopt it. Find out how VDI could benefit you in the long term by saving your organization time and money.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Pure Storage

The Benefits of a More Efficient Hyperconverged Architecture
sponsored by Pivot3
WHITE PAPER: Discover in this resource a comparison of HCI appliances purpose-built for storage-centric business workload environments, based on criteria including VDI density, storage efficiency, and cost savings.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Pivot3

Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER: Flash storage not only provides the performance necessary to run next-generation applications – such as cloud, mobile and social systems, and data analytics – but also provides the security necessary to prevent data breaches. See how your enterprise can boost your competitive advantage by leveraging flash today.
Posted: 01 Jun 2016 | Published: 31 Jan 2015

IBM

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Data Protection in Two Dimensions
sponsored by IBM
WHITE PAPER: Uncover an all-flash storage array that provides two independent dimensions of data protection to help monitor and predict upcoming flash failures. See how you can increase your flash storage efficiency and endurance without sacrificing protection.
Posted: 18 May 2016 | Published: 31 Jan 2016

IBM

Forward Thinking Backup Through Unified Data Protection
sponsored by Veritas
WHITE PAPER: This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.
Posted: 18 May 2016 | Published: 18 May 2016

Veritas

Modern Snapshot Management: Enhancing Application Protection and Recovery
sponsored by Commvault
WHITE PAPER: Integrating array-based snapshot technologies with an existing data protection approach can greatly improve data manageability, recovery, and protection. Discover how you can deliver faster and more granular application-aware data recovery performance with less effort, complexity, and cost.
Posted: 09 May 2016 | Published: 31 Dec 2015

Commvault

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Drowning in Data Management Complexity? Eliminate IT and Storage Inefficiencies
sponsored by Commvault
WHITE PAPER: Discover in this white paper how to lessen complexity, reduce risk, and effectively harness IT resources in your Big Data and database environments. Read on to achieve strategic gains in productivity and backup with expert advice.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Commvault

Choosing the Right Public Cloud for Better Data Protection
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how to use infrastructure-as-a-service (IaaS) and data protection software to solve the complexity and cost challenges of protecting data. Read on to evaluate public cloud capabilities and data protection software capabilities, so that you can choose the right solution for your enterprise.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Dell Software

Case Study: NTT Communicatiosn Delivers Object Storage to Enterprise Cloud Service
sponsored by Cloudian
WHITE PAPER: This case study highlights a telecom company's decision to replace their outdated distributed file storage system with a robust object storage platform designed for hybrid cloud infrastructures. Read on to discover the benefits this solution could provide your enterprise, including reduced acquisition costs, configurable replication, and more.
Posted: 15 Apr 2016 | Published: 31 Dec 2015

Cloudian

Future Proof your Data Storage with the Hybrid Cloud
sponsored by Equinix
WHITE PAPER: This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Equinix
1 - 25 of 225 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement