IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
1 - 25 of 203 Matches Previous Page  |  Next Page
Self-encrypting Drives: You Don’t Have to Sacrifice Performance for Security
sponsored by SanDisk Corporation
WHITE PAPER: A complimentary white paper on high-performing, secure and affordable SanDisk SSDs.
Posted: 07 May 2015 | Published: 07 May 2015

SanDisk Corporation

7 Best Practices for Securing Hadoop
sponsored by IBM
WHITE PAPER: This white paper explores how to develp a data life-cycle-centric approach to Hadoop security by asking yourself five integral questions. Access now to learn the 7 step program to improving your security strategy.
Posted: 21 Apr 2015 | Published: 11 Apr 2014

IBM

The Power of Self-Encrypting SSD
sponsored by Toshiba
WHITE PAPER: This video examines a self-encrypting SSD offering that addresses the performance drains of CPU software-based encryption in order to greatly improve storage speed and operability.
Posted: 07 Apr 2015 | Published: 01 Feb 2015

Toshiba

How to Address Three Key Challenges When Considering Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about Gartner's recommendations for overcoming the 3 most common endpoint backup hurdles. Read on to learn how to keep company data safe, even on personal devices.
Posted: 01 Apr 2015 | Published: 07 Nov 2014

Druva Software

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Shedding Light on Dark Data
sponsored by Hewlett-Packard Company
WHITE PAPER: "Dark data" occupies a murky area in compliance policy. Ask these four questions to start taming digital debris.
Posted: 26 Mar 2015 | Published: 27 Mar 2015

Hewlett-Packard Company

The Security Benefits of Software-Defined Storage
sponsored by DataCore Software Corporation
WHITE PAPER: Access this white paper to learn what the benefits of SDS are, including how it can help you prevent data loss.
Posted: 05 Mar 2015 | Published: 30 Sep 2014

DataCore Software Corporation

Tape Fallacies Exposed
sponsored by LTO
WHITE PAPER: Access this white paper to learn about tape backup fallacies and why they're incorrect.
Posted: 03 Feb 2015 | Published: 10 Nov 2009

LTO

Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

Why Should You Rethink Your Data Protection Strategy?
sponsored by Dell, Inc.
WHITE PAPER: Backing up data is vital – but what good is backup without effective restoration? This informative white paper details how to redefine your data protection strategy by focusing on recovery.
Posted: 02 Jan 2015 | Published: 31 Dec 2014

Dell, Inc.

Storage anywhere and everywhere: dealing with the challenges of data fragmentation
sponsored by Mimecast
WHITE PAPER: Are we in danger of losing control of business information? This white paper outlines issues associated with information requirements and possible solutions.
Posted: 19 Dec 2014 | Published: 30 Jun 2013

Mimecast

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

3 Reasons to Find Backup and Recovery Built for Virtualized Environments
sponsored by VMware
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

VMware

Protect Endpoint Data without Sacrificing End User Experience
sponsored by Code42
WHITE PAPER: Check out this white paper to learn your options for delivering better backup and security for the data stored on your workforce's devices. You'll also learn how you can deliver an architecture that scales with market/client demand and empowers you with business-grade tools – without sacrificing the experience of the end user.
Posted: 07 Jul 2014 | Published: 30 May 2014

Code42

Top Five Benefits of Image-Based Backup
sponsored by Datto, Inc.
WHITE PAPER: This white paper explains the benefits of image-based backup over traditional methods. Image-based backup provides faster and more reliable data recovery and protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Datto, Inc.

Back Up Mission-Critical Data Whenever and Wherever
sponsored by Code42
WHITE PAPER: This in-depth resource shines light on a continuous, multi-destination system to back up mission-critical data whenever and wherever it is created.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

Why Data Deduplication Should Matter to You
sponsored by HP and Intel
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HP and Intel

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Better Backup for Big Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains the challenges of modern data backup in the age of Big Data and proposes a new solution that delivers comprehensive database support, protection for data warehouse appliances, Hadoop and Big Data analytics capabilities and more.
Posted: 28 May 2014 | Published: 28 Sep 2012

Symantec Corporation

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 15 May 2014 | Published: 15 May 2014

Dell Software

Introduction to Better Disk Backup for Virtual Machines
sponsored by VMware, Inc.
WHITE PAPER: This white paper gives  an overview of the architecture, deployment, configuration and management of vSphere Data Protection, a backup and recovery solution for VMware, from VMware.
Posted: 25 Apr 2014 | Published: 13 Nov 2013

VMware, Inc.

Case Study - Australia Institute of Management
sponsored by Nimble Storage
WHITE PAPER: This case study highlights the importance of updating IT systems to handle increased storage demands. It also explains how one organization was able to implement a shared storage solution that was designed to work in a virtualized environment.
Posted: 23 Apr 2014 | Published: 30 Apr 2013

Nimble Storage

Enhanced Data Protection for Virtualized Environments
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

VMware, Inc.

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

EMC Isilon Scale-Out NAS answers the PACS Storage Question
sponsored by EMC & Arrow
WHITE PAPER: This brief resource provides information on a solution that reduces costs and improves operational efficiency by consolidating image data from each department PACS into a single, unified independent storage solution.
Posted: 08 Apr 2014 | Published: 31 Oct 2012

EMC & Arrow
1 - 25 of 203 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement