IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
1 - 25 of 207 Matches Previous Page  |  Next Page
Top Ten Database Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Email Archive Migration: Opportunities and Risks
sponsored by QUADROtech
WHITE PAPER: This informative white paper discusses important issues associated with drivers for archive migration and how to manage these migrations properly. Read on to see how your enterprise can benefit from the use of a new archiving platform.
Posted: 02 Oct 2015 | Published: 31 Jan 2015


Four Essential Fundamentals to Increasing Agility in the Cloud
sponsored by Commvault
WHITE PAPER: Access this white paper to learn about the 4 key elements that should be implemented to help your enterprise efficiently manage data protection and recovery operations. Read on to see how you can achieve a single point of control for both your on-premise and cloud-based data and improve your overall data protection.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Ensure Business Continuity with a Modern Disaster Recovery Approach
sponsored by Commvault
WHITE PAPER: This essential white paper discusses the need for a modern, cloud approach to disaster recovery that consists of multiple facets united on a common platform. Read on to learn how cloud can help your enterprise unify, centralize and simplify your DR operations.
Posted: 29 Sep 2015 | Published: 29 Sep 2015


Apply Integrated Data Protection That Maximizes Efficiency, Reduces Risk
sponsored by Nimble Storage
WHITE PAPER: This document discusses the implementation of a complete storage foundation that enables comprehensive and efficient data protection. Read now to see how integrated data protection can help your enterprise reduce risk as well as operational overhead and complexity.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Nimble Storage

8 Storage Tips and Tricks from Pure Storage
sponsored by Pure Storage
WHITE PAPER: This brief white paper highlights 8 tips and tricks for implementing one particular flash storage platform. Access this paper now to key into expert advice for selecting enterprise storage vendors, as well as learn why legacy storage recommendations no longer hold true for flash, and more.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Skullcandy Blasts Performance with Flash Storage: A Case Study
sponsored by Pure Storage
WHITE PAPER: In this case study, you will learn how you can free your data center space previously occupied by several legacy disk arrays with flash storage, much like Skullcandy. Read on here to find out how to improve the speed and reliability of your organization with this storage solution, as well as scale customer analytics.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015


PlentyOfFish and SanDisk: A Perfect Match for Engineering Love
sponsored by SanDisk Corporation
WHITE PAPER: This case study outlines how the world's largest online dating site, PlentyOfFish was able to overcome its storage challenges by transitioning to an all-flash environment. Access this resource to master the cost containment and data performance problems in your organization.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SanDisk Corporation

The Value of Offsite Storage for Data Protection
sponsored by Barracuda Networks
WHITE PAPER: This paper highlights the benefits of storing data at secure offsite locations. Read on to see how doing so will offer a degree of protection that cannot be duplicated with an onsite-only solution.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

Barracuda Networks

Security in the Cloud: Tips on How to Protect Your Data
sponsored by Procore
WHITE PAPER: This white paper outlines the basics of cloud storage security and the capabilities to look for in providers to ensure data protection.
Posted: 27 Aug 2015 | Published: 05 Aug 2015


The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


Enterprise File Sharing Without Giving Up Control of IT Functions
sponsored by Red Hat
WHITE PAPER: Read this white paper and discover how the Red Hat Gluster Storage solution enhances workforce productivity without handing over control of IT functions to public cloud service providers.
Posted: 29 Jun 2015 | Published: 27 Feb 2015

Red Hat

7 Best Practices for Securing Hadoop
sponsored by IBM
WHITE PAPER: This white paper explores how to develop a data life-cycle-centric approach to Hadoop security by asking yourself five integral questions. Access now to learn the 7 step program to improving your security strategy.
Posted: 21 Apr 2015 | Published: 11 Apr 2014


The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Tape Fallacies Exposed
sponsored by LTO
WHITE PAPER: Access this white paper to learn about tape backup fallacies and why they're incorrect.
Posted: 03 Feb 2015 | Published: 10 Nov 2009


Storage anywhere and everywhere: dealing with the challenges of data fragmentation
sponsored by Mimecast
WHITE PAPER: Are we in danger of losing control of business information? This white paper outlines issues associated with information requirements and possible solutions.
Posted: 19 Dec 2014 | Published: 30 Jun 2013


Best Practice Security in a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: Access this white paper to learn about a straightforward approach to cloud security that will not only assist in mitigating the risks associated with cloud deployments and usage, but also improve and standardize your security posture and practices across all environments.
Posted: 29 Oct 2014 | Published: 31 Jul 2014


Top Five Benefits of Image-Based Backup
sponsored by Datto, Inc.
WHITE PAPER: This white paper outlines the five most important benefits you can achieve with image-based backup. Read on to learn how image-based backup differs from traditional backups, as well as its impact on disaster recovery.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Datto, Inc.

Why Data Deduplication Should Matter to You
sponsored by HP and Intel®
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HP and Intel®

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Better Backup for Big Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains the challenges of modern data backup in the age of Big Data and proposes a new solution that delivers comprehensive database support, protection for data warehouse appliances, Hadoop and Big Data analytics capabilities and more.
Posted: 28 May 2014 | Published: 28 Sep 2012

Symantec Corporation

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 15 May 2014 | Published: 15 May 2014

Dell Software

Introduction to Better Disk Backup for Virtual Machines
sponsored by VMware, Inc.
WHITE PAPER: This white paper gives  an overview of the architecture, deployment, configuration and management of vSphere Data Protection, a backup and recovery solution for VMware, from VMware.
Posted: 25 Apr 2014 | Published: 13 Nov 2013

VMware, Inc.

Case Study - Australia Institute of Management
sponsored by Nimble Storage
WHITE PAPER: This case study highlights the importance of updating IT systems to handle increased storage demands. It also explains how one organization was able to implement a shared storage solution that was designed to work in a virtualized environment.
Posted: 23 Apr 2014 | Published: 30 Apr 2013

Nimble Storage
1 - 25 of 207 Matches Previous Page    1 2 3 4    Next Page
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement