IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
1 - 25 of 218 Matches Previous Page  |  Next Page
Secure Cloud Application Usage: Protect the Business Against Cloud-Based Threats
sponsored by IBM
WHITE PAPER: This essential solution brief highlights a SaaS solution that integrates cloud discovery, threat intelligence and prevention, policy enforcement, identity as a service, and more into one solution. Access now to see how this solution can simplify and secure your cloud application use as well as help protect against user and cloud-based threats.
Posted: 10 Nov 2015 | Published: 30 Sep 2015


Promote True Data Agility Using All-Flash Arrays: What You Need to Know
sponsored by Data#3
WHITE PAPER: In this white paper, you will discover why all-flash arrays deliver improved business benefits and lower operating expenses, particularly in performance-intensive applications such as big data, VDI, OLTP, and hybrid cloud computing.
Posted: 10 Nov 2015 | Published: 30 Jun 2015


How to Enable an Analytics-Driven Approach to Backup and Recovery
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper discusses an analytics-driven solution that supports mission-critical data backup. Read on to see how this approach can address the dynamic nature of today's data center, handle the diversity of data that must be protected, and provide a far greater level of business resiliency than yesterday's backup and recovery solution.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

Hewlett-Packard Enterprise

Data Protection for Virtual Environments: Extending Solutions to VMware and Hyper-V Environments
sponsored by IBM
WHITE PAPER: This white paper highlights a data protection solution for virtual environments that can adjust backups to support larger and more critical workloads. Read on to learn how this solution can make it easier for your enterprise to manage and monitor a complete data protection environment, both physical and virtual.
Posted: 03 Nov 2015 | Published: 03 Nov 2015


IBM vs. EMC Data Protection Platforms: A Competitive Test and Evaluation Report
sponsored by TCM/IBM
WHITE PAPER: This white paper evaluates two commercially available storage solutions, EMC vs. IBM, in a backup and retrieval scenario and focuses on the throughput and scalability they both bring to the table. Read on to see what solution can provide you with the right data protection for your enterprise and can fulfill your performance and scalability needs.
Posted: 02 Nov 2015 | Published: 02 Nov 2015


A Solution to Storage Encryption Inefficiencies
sponsored by IBM
WHITE PAPER: This white paper introduces an innovative way to cut down on those inefficiencies and costs with a single encryption solution that protects your entire storage environment.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


Deep Storage Solution Leverages Tape, NAS, and Cloud for Cost-Effective DRaaS
sponsored by FujiFilm Dternity
WHITE PAPER: This white paper discusses the benefits of a hybrid disaster recovery approach while also implementing DRaaS for data protection and recovery. Read more to see how this can offer your enterprise an easy-to-use, cost-effective approach to your data protection systems that will help improve your business continuity both on-premise and in the cloud.
Posted: 27 Oct 2015 | Published: 31 Aug 2015

FujiFilm Dternity

Is Your High-Value Data Safe?
sponsored by Imation Corp.
WHITE PAPER: This resource discusses how you can keep your most valuable data out of hackers' hands with a range of advanced technologies, including encryption and stronger authentication.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Imation Corp.

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Four Essential Fundamentals to Increasing Agility in the Cloud
sponsored by Commvault
WHITE PAPER: Access this white paper to learn about the 4 key elements that should be implemented to help your enterprise efficiently manage data protection and recovery operations. Read on to see how you can achieve a single point of control for both your on-premise and cloud-based data and improve your overall data protection.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Ensure Business Continuity with a Modern Disaster Recovery Approach
sponsored by Commvault
WHITE PAPER: This essential white paper discusses the need for a modern, cloud approach to disaster recovery that consists of multiple facets united on a common platform. Read on to learn how cloud can help your enterprise unify, centralize and simplify your DR operations.
Posted: 29 Sep 2015 | Published: 29 Sep 2015


8 Storage Tips and Tricks from Pure Storage
sponsored by Pure Storage
WHITE PAPER: This brief white paper highlights 8 tips and tricks for implementing one particular flash storage platform. Access this paper now to key into expert advice for selecting enterprise storage vendors, as well as learn why legacy storage recommendations no longer hold true for flash, and more.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Case Study: Blast Performance with Flash
sponsored by Pure Storage
WHITE PAPER: This case study showcases a company's adoption of flash storage to free up data center space previously occupied by several legacy disk arrays. Read on to find out how to improve the speed and reliability of your organization with this storage solution, as well as scale customer analytics.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015


PlentyOfFish and SanDisk: A Perfect Match for Engineering Love
sponsored by SanDisk Corporation
WHITE PAPER: This case study outlines how the world's largest online dating site, PlentyOfFish was able to overcome its storage challenges by transitioning to an all-flash environment. Access this resource to master the cost containment and data performance problems in your organization.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SanDisk Corporation

Examining the Top Competitors of Converged Infrastructure Services
sponsored by Pivot3
WHITE PAPER: In this guide, you will learn why organizations are looking to adopt and implement converged infrastructure environments, as well as get an overview of the converged infrastructure providers, including a 10-point vendor comparison.
Posted: 08 Sep 2015 | Published: 31 Dec 2014


The Validated Design Guide for Enterprise Desktop Solutions
sponsored by Pivot3
WHITE PAPER: This white paper serves as a guide for a high-grade enterprise desktop solution. The guide is intended to provide guidance for the introduction of proof of concepts, emerging new technology and architectures, as well as enhancement of customer use cases.
Posted: 08 Sep 2015 | Published: 08 Sep 2015


SEA-TAC Airport Enterprise Storage Strategy Fosters Sustainability
sponsored by Pivot3
WHITE PAPER: This case study demonstrates how the Seattle-Tacoma International Airport developed a plan to deploy a centralized security management system. Read on here to deliver enterprise-class video surveillance IT infrastructure in a simple-to-deploy and scale-out appliance model.
Posted: 04 Sep 2015 | Published: 04 Sep 2015


Security in the Cloud: Tips on How to Protect Your Data
sponsored by Procore
WHITE PAPER: This white paper outlines the basics of cloud storage security and the capabilities to look for in providers to ensure data protection.
Posted: 27 Aug 2015 | Published: 05 Aug 2015


The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


Enterprise File Sharing Without Giving Up Control of IT Functions
sponsored by Red Hat
WHITE PAPER: Read this white paper and discover how the Red Hat Gluster Storage solution enhances workforce productivity without handing over control of IT functions to public cloud service providers.
Posted: 29 Jun 2015 | Published: 27 Feb 2015

Red Hat

7 Best Practices for Securing Hadoop
sponsored by IBM
WHITE PAPER: This white paper explores how to develop a data life-cycle-centric approach to Hadoop security by asking yourself five integral questions. Access now to learn the 7 step program to improving your security strategy.
Posted: 21 Apr 2015 | Published: 11 Apr 2014


Shedding Light on Dark Data
sponsored by Hewlett Packard Enterprise
WHITE PAPER: "Dark data" occupies a murky area in compliance policy. Ask these four questions to start taming digital debris.
Posted: 26 Mar 2015 | Published: 27 Mar 2015

Hewlett Packard Enterprise

The Security Benefits of Software-Defined Storage
sponsored by DataCore Software Corporation
WHITE PAPER: Access this white paper to learn what the benefits of SDS are, including how it can help you prevent data loss.
Posted: 05 Mar 2015 | Published: 30 Sep 2014

DataCore Software Corporation

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business
1 - 25 of 218 Matches Previous Page    1 2 3 4    Next Page
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement