IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
1 - 25 of 202 Matches Previous Page  |  Next Page
Tape Fallacies Exposed
sponsored by LTO
WHITE PAPER: Access this white paper to learn about tape backup fallacies and why they're incorrect.
Posted: 03 Feb 2015 | Published: 10 Nov 2009

LTO

Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

Deduplication Makes Data Protection Even Stronger
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: Access this white paper to learn about the next generation of data deduplication.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

A Guide for Solving Backup Complexity and Scale
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: As data requirement increase, organizations move from legacy to dynamic methods of backup, many companies find that creating and effective backup, recovery, and archiving (BURA) solutions involves piecing together multiple products. This white paper details a game changer in terms of backup and recovery.
Posted: 19 Jan 2015 | Published: 31 May 2014

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Why Should You Rethink Your Data Protection Strategy?
sponsored by Dell, Inc.
WHITE PAPER: Backing up data is vital – but what good is backup without effective restoration? This informative white paper details how to redefine your data protection strategy by focusing on recovery.
Posted: 02 Jan 2015 | Published: 31 Dec 2014

Dell, Inc.

Storage anywhere and everywhere: dealing with the challenges of data fragmentation
sponsored by Mimecast
WHITE PAPER: Are we in danger of losing control of business information? This white paper outlines issues associated with information requirements and possible solutions.
Posted: 19 Dec 2014 | Published: 30 Jun 2013

Mimecast

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Hightail for Enterprise: Security Overview
sponsored by Hightail
WHITE PAPER: This white paper outlines how Hightail can keep files secure, even with unsanctioned sharing tools.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Hightail

Why Converged Infrastructure and Data Protection Should Be One Conversation
sponsored by Arrow & HDS
WHITE PAPER: Learn how you can ensure all of the benefits of virtualization by upgrading to a new data protection approach.
Posted: 24 Sep 2014 | Published: 30 May 2014

Arrow & HDS

3 Reasons to Find Backup and Recovery Built for Virtualized Environments
sponsored by VMware
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

VMware

Protect Endpoint Data without Sacrificing End User Experience
sponsored by Code42
WHITE PAPER: Check out this white paper to learn your options for delivering better backup and security for the data stored on your workforce's devices. You'll also learn how you can deliver an architecture that scales with market/client demand and empowers you with business-grade tools – without sacrificing the experience of the end user.
Posted: 07 Jul 2014 | Published: 30 May 2014

Code42

Back Up Mission-Critical Data Whenever and Wherever
sponsored by Code42
WHITE PAPER: This in-depth resource shines light on a continuous, multi-destination system to back up mission-critical data whenever and wherever it is created.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

Keep Mission Critical Applications Online and Your Data Secure
sponsored by IBM
WHITE PAPER: Are you searching for a way to keep mission-critical apps online and your data secure? This quick infographic offers insight into security challenges that may affect your organization and a tool to help conquer these obstacles.
Posted: 18 Apr 2014 | Published: 30 Nov 2013

IBM

Why Data Deduplication Should Matter to You
sponsored by HP and Intel
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HP and Intel

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Better Backup for Big Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains the challenges of modern data backup in the age of Big Data and proposes a new solution that delivers comprehensive database support, protection for data warehouse appliances, Hadoop and Big Data analytics capabilities and more.
Posted: 28 May 2014 | Published: 28 Sep 2012

Symantec Corporation

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 15 May 2014 | Published: 15 May 2014

Dell Software

Introduction to Better Disk Backup for Virtual Machines
sponsored by VMware, Inc.
WHITE PAPER: This white paper gives  an overview of the architecture, deployment, configuration and management of vSphere Data Protection, a backup and recovery solution for VMware, from VMware.
Posted: 25 Apr 2014 | Published: 13 Nov 2013

VMware, Inc.

Case Study - Australia Institute of Management
sponsored by Nimble Storage
WHITE PAPER: This case study highlights the importance of updating IT systems to handle increased storage demands. It also explains how one organization was able to implement a shared storage solution that was designed to work in a virtualized environment.
Posted: 23 Apr 2014 | Published: 30 Apr 2013

Nimble Storage

Enhanced Data Protection for Virtualized Environments
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

VMware, Inc.

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

EMC Isilon Scale-Out NAS answers the PACS Storage Question
sponsored by EMC & Arrow
WHITE PAPER: This brief resource provides information on a solution that reduces costs and improves operational efficiency by consolidating image data from each department PACS into a single, unified independent storage solution.
Posted: 08 Apr 2014 | Published: 31 Oct 2012

EMC & Arrow

Top 7 Reasons to Improve Your Analytics with a EMC Isilon Storage
sponsored by EMC & Arrow
WHITE PAPER: This white paper lists the top benefits for adopting an EMC Isilon scale-out storage solution for Hadoop analytics. This solution will lower operating and capital costs while allowing for more big data analytics capabilities
Posted: 04 Apr 2014 | Published: 30 Mar 2012

EMC & Arrow

Top 10 Reasons to Choose EMC Isilon for Hadoop Analytics
sponsored by EMC & Arrow
WHITE PAPER: This white paper lists the top benefits for adopting an EMC Isilon scale-out storage solution for Hadoop analytics. This solution will lower operating and capital costs while allowing for more big data analytics capabilities
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC & Arrow

Top 7 Use Cases for Business-Class Cloud File Sync
sponsored by eFolder
WHITE PAPER: This white paper describes the seven key areas where business-class cloud file sync can deliver value for virtually any organization, no matter size or industry. In an increasingly mobile world, providing documents that are in sync at all time is vital, and cloud file sync can deliver that.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

eFolder
1 - 25 of 202 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement