IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
151 - 175 of 199 Matches Previous Page  |  Next Page
Delivering IT as a Service for Virtualized Data Centers
sponsored by Continental Resources
WHITE PAPER: Architecting a successful cloud computing infrastructure can be challenging. The secure cloud architecture offers the best products and features to create a cloud service that can realize the efficiencies of shared infrastructure while still offering the security, flexibility, resilience, and ease of management of a traditional IT deployment.
Posted: 01 Apr 2010 | Published: 01 Apr 2010

Continental Resources

Proofpoint TechBrief: Email Archiving and Exchange 2010
sponsored by Proofpoint, Inc.
WHITE PAPER: Proofpoint ARCHIVE™ greatly extends the email retention features promised in Exchange 2010, delivers the robust features and performance that enterprises truly require and makes those features available today, without requiring an upgrade to the 2010 platform. Read this techbrief to learn more!
Posted: 09 Mar 2010 | Published: 09 Mar 2010

Proofpoint, Inc.

Six Tips for Reducing Downtime in Travel and Transport
sponsored by Marathon Technologies
WHITE PAPER: Whether it's a security system, baggage handling application, order or vessel tracking downtime to applications supporting travel and transportation can throw off precisely timed schedules for travelers and shipments alike. This paper outlines six key tips for keeping travel and transportation logistics applications running without interruption.
Posted: 23 Feb 2010 | Published: 23 Feb 2010

Marathon Technologies

A Practical Guide to Cloud Computing Security
sponsored by Avanade
WHITE PAPER: Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

Avanade

How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

Five Cost-Effective Ways to Enable Fast Recovery
sponsored by i365, makers of Evault
WHITE PAPER: Data protection is about more than backup. It’s also about the ability to recover data in the event of loss, and to get back to business without delay. Read this white paper to learn 5 ways to ensure the most rapid return to operations and minimize data loss under each recovery scenario your company may face.
Posted: 11 Jan 2010 | Published: 11 Jan 2010

i365, makers of Evault

12 Best Practices for Data Backup and Recovery
sponsored by i365, makers of Evault
WHITE PAPER: Read this white paper to learn about 12 best practices for data backup and recovery such as Reliability, Breadth of Offering, Security, Accessibility, Scalability, Cost-effectiveness and more!
Posted: 11 Jan 2010 | Published: 11 Jan 2010

i365, makers of Evault

PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks
sponsored by Absolute Software
WHITE PAPER: Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Absolute Software

You’re Not As Backed Up As You Think
sponsored by EMC Corporation
WHITE PAPER: Learn how to overcome the challenges of traditional data backup for your small to mid-size organization and discover the benefits of implementing a Software-As-A-Service (SaaS) backup solution.
Posted: 11 Dec 2009 | Published: 11 Dec 2009

EMC Corporation

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

The Business Impact of Data Security Regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Six Secrets to 24x7 Exchange Availability
sponsored by Marathon Technologies
WHITE PAPER: The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

Disaster Got You Down?
sponsored by CDW Corporation
WHITE PAPER: While trying to predict an outage is impossible, being prepared for one is not. Having the right tools in place to respond to a "disaster" is essential to sustaining a successful organization. A business-continuity / disaster-recovery plan can help you cut costs by avoiding downtime, lost revenue and dissatisfied customers.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

CDW Corporation

Guide: Secure Copy
sponsored by ScriptLogic Corporation
WHITE PAPER: Getting data moved over to a new server is more than merely copying the most recent files and folders to that machine. File security, permissions, shared folders and local groups facilitating access need to be maintained.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Coping with SAN Storage Frustration Caused by Server Virtualization
sponsored by NEC Corporation
WHITE PAPER: Read this paper to learn strategies to deal with server virtualization issues associated with storage networking.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

NEC Corporation

Achieving flexible storage scalability: The Case for Enterprise Modular Storage Arrays
sponsored by NEC Corporation
WHITE PAPER: For businesses on a data growth path, the management of storage creates numerous problems, including business disruptions when upgrading and the need for greater availability and scaling flexibility. This paper makes the case for enterprise modular storage arrays to achieve the flexible storage scalability businesses need.
Posted: 21 Aug 2009 | Published: 06 Aug 2009

NEC Corporation

The Executive Guide to Data Loss Prevention
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

Websense, Inc.

Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness
sponsored by Sirius Computer Solutions
WHITE PAPER: IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.
Posted: 08 Jul 2009 | Published: 26 Jun 2009

Sirius Computer Solutions

BACKUP REDESIGN: Do More with Less ... Really!
sponsored by AppAssure Software, Inc.
WHITE PAPER: The call to protect corporate data in less time and for less money has inspired a whole new way of thinking about backup - a complete backup redesign. This paper explores a better way to backup and protect data and applications - disk-based application.
Posted: 10 Apr 2009 | Published: 10 Apr 2009

AppAssure Software, Inc.

Active Anti-Malware Protection: Self-Defending IronKey Flash Drives Stop MalWare and Viruses from Spreading to Computers and Networks
sponsored by IronKey
WHITE PAPER: Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

IronKey

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 24 Feb 2009 | Published: 24 Feb 2009

IBM

Monitoring Physical Threats in the Data Center
sponsored by Schneider Electric
WHITE PAPER: This paper describes the class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime.
Posted: 04 Feb 2009 | Published: 03 Feb 2009

Schneider Electric

IDC Technology Spotlight: Optimizing Storage to Reduce Data Footprint and Lower Costs
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines data deduplication technologies supported by the latest Storage Solutions from HP. Data deduplication is a hot topic in data protection and therefore, also a relevant topic for HP Data Protector software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Hewlett-Packard Company

Sun Microsystems How to Migrate from Microsoft Exchange 2000/2003 to Exchange Server 2007
sponsored by Incentra Solutions
WHITE PAPER: This guide documents the process for a typical migration to Microsoft Exchange Server 2007 along with a few critical considerations before the deployment takes place.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Incentra Solutions

Top Considerations for Implementing Secure Backup and Recovery
sponsored by Zmanda Inc.
WHITE PAPER: Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data.
Posted: 09 Jul 2008 | Published: 08 Jul 2008

Zmanda Inc.
151 - 175 of 199 Matches Previous Page    5 6 7 8    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement