IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
1 - 25 of 222 Matches Previous Page  |  Next Page
Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy
sponsored by Barracuda Networks
WHITE PAPER: This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Barracuda Networks

Backup, Archiving, and Recovery Tools for Large Volume Data
sponsored by Barracuda Networks
WHITE PAPER: This white paper explores viable backup and recovery options, ranging from tape backups to cloud-based technology. Discover how to implement a complete, cloud-integrated strategy for protecting data in physical, virtual, and SaaS environments.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

Barracuda Networks

Making the Case for "Always Be Testing"
sponsored by QuorumLabs Inc.
WHITE PAPER: Whatever the reason, most businesses will experience at least one instance of system downtime a year. To deal with this contingency, this paper makes the case for an "Always Be Testing" (ABT) approach to DR. Find out how you can realistically implement weekly testing to ensure that your backup and data protection strategy is sound and reliable.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

QuorumLabs Inc.

Improve Your Backup and Recovery Capabilities for SAP Environments
sponsored by Commvault
WHITE PAPER: This white paper explores how the use of Commvault software can help you store and protect your data on both Oracle and SAP HANA platforms. Discover how you can reduce full data backups to once a week, improve your system recovery time, and more.
Posted: 13 Oct 2016 | Published: 13 Oct 2016


5 Ways to Get Control of Your Backup and Recovery in Today's Environment
sponsored by Commvault
WHITE PAPER: This white paper explores the idea of a single, integrated data backup, recovery, retention, search, and access platform that's designed from the beginning to be holistic. Discover 5 ways it can improve data management and help you unlock efficiency without adding complexity.
Posted: 13 Oct 2016 | Published: 13 Oct 2016


Top 4 Reasons to Adopt Data Lifecycle Management
sponsored by Iron Mountain
WHITE PAPER: This white paper examines the top 4 reasons why you must focus on deploying data lifecycle management as a strategic initiative. It also explores where and how to use specific solutions, along with the benefits of working with a partner that can offer a comprehensive approach to data lifecycle management.
Posted: 05 Oct 2016 | Published: 31 Aug 2016

Iron Mountain

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

Technical Advances and Regulatory Changes Drive Demand for Robust Video Surveillance Systems
sponsored by Dell, Inc.
WHITE PAPER: Traditional video surveillance systems can't keep up with modern enterprise needs. However, this white paper explores IP-based storage strategies for managing and sifting through petabytes of video data quickly and easily. Discover how you can enable advanced, scalable storage functionality to deliver superior digital performance.
Posted: 03 Oct 2016 | Published: 29 Feb 2016

Dell, Inc.

File Sync and Share: There’s Too Much at Stake to Compromise
sponsored by Hitachi Data Systems
WHITE PAPER: Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Better Together: Security and Collaboration with Backup and Box
sponsored by Code42
WHITE PAPER: This white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data.
Posted: 23 Sep 2016 | Published: 23 Sep 2016


Flash Storage Drives New Efficiencies in Government
sponsored by Pure Storage
WHITE PAPER: Government agencies' existing storage infrastructures often can't keep up with the need to store more and more data, because they aren't scalable or fast enough. This white paper details how these agencies' are using flash storage to address the major pain points of performance, manageability and cost prevalent with traditional storage.
Posted: 15 Sep 2016 | Published: 29 Jul 2016

Pure Storage

SAP HANA® Backup and Recovery using Pure Storage® Snapshots
sponsored by Pure Storage
WHITE PAPER: This paper covers the necessary steps to take a snapshot of a SAP HANA® instance for backup purposes. It also explains how to restore the database from the snapshot.
Posted: 12 Sep 2016 | Published: 31 Jul 2016

Pure Storage

Protecting Critical Data in Virtual Environments
sponsored by IBM
WHITE PAPER: VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.
Posted: 25 Aug 2016 | Published: 31 Dec 2015


Converged Data Protection for Continuously Available Applications
sponsored by NTT ICT
WHITE PAPER: Learn how to combine the availability of instant local and remote array-based snapshots with cost efficient disk-based backup, in order to provide multiple recovery points and rapid data restore times. Read on to examine a centralized recovery manager that maintains constant app availability.
Posted: 04 Aug 2016 | Published: 04 Aug 2016


Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection
sponsored by NTT ICT
WHITE PAPER: This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.
Posted: 04 Aug 2016 | Published: 04 Aug 2016


Application-managed Data Protection for HPE 3PAR StoreServ Storage
sponsored by NTT ICT
WHITE PAPER: In this white paper, examine the benefits of combining backups and snapshots in application-managed, storage-integrated, end-to-end data protection. Read on to simplify your evolving data environment, bolster backup windows and recovery time, and access multi-streaming support.
Posted: 03 Aug 2016 | Published: 03 Aug 2016


Extend Your Storage Options without Compromising on Security, Reliability
sponsored by BT
WHITE PAPER: Cloud-based object storage ensures data delivery, provides enhanced security and durability that cloud storage solutions typically do not offer. Discover the benefits your enterprise can reap with this storage solution, including easy data migration, automated data replication, and more.
Posted: 29 Jul 2016 | Published: 31 Dec 2014


Best Practices in VDI Implementation in Healthcare Environments
sponsored by Pure Storage
WHITE PAPER: While VDI appears ideal for the healthcare industry, its expensive cost and impact on current security leave many reluctant to adopt it. Find out how VDI could benefit you in the long term by saving your organization time and money.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Pure Storage

The Benefits of a More Efficient Hyperconverged Architecture
sponsored by Pivot3
WHITE PAPER: Discover in this resource a comparison of HCI appliances purpose-built for storage-centric business workload environments, based on criteria including VDI density, storage efficiency, and cost savings.
Posted: 08 Jun 2016 | Published: 08 Jun 2016


Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER: Flash storage not only provides the performance necessary to run next-generation applications – such as cloud, mobile and social systems, and data analytics – but also provides the security necessary to prevent data breaches. See how your enterprise can boost your competitive advantage by leveraging flash today.
Posted: 01 Jun 2016 | Published: 31 Jan 2015


Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Data Protection in Two Dimensions
sponsored by IBM
WHITE PAPER: Uncover an all-flash storage array that provides two independent dimensions of data protection to help monitor and predict upcoming flash failures. See how you can increase your flash storage efficiency and endurance without sacrificing protection.
Posted: 18 May 2016 | Published: 31 Jan 2016


Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015


Choosing the Right Public Cloud for Better Data Protection
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how to use infrastructure-as-a-service (IaaS) and data protection software to solve the complexity and cost challenges of protecting data. Read on to evaluate public cloud capabilities and data protection software capabilities, so that you can choose the right solution for your enterprise.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Dell Software

Case Study: NTT Communicatiosn Delivers Object Storage to Enterprise Cloud Service
sponsored by Cloudian
WHITE PAPER: This case study highlights a telecom company's decision to replace their outdated distributed file storage system with a robust object storage platform designed for hybrid cloud infrastructures. Read on to discover the benefits this solution could provide your enterprise, including reduced acquisition costs, configurable replication, and more.
Posted: 15 Apr 2016 | Published: 31 Dec 2015

1 - 25 of 222 Matches Previous Page    1 2 3 4    Next Page
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement