IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
151 - 175 of 218 Matches Previous Page  |  Next Page
Five Keys to Preventing Data Corruption in Storage Environments
sponsored by StorageCraft Technology Corporation
WHITE PAPER: The lifeblood of a corporation is in the information that it generates and stores. Due to the increasing amount of data and information that an organization must protect, robust computer systems are essential for survival. Read this white paper to learn about the 5 keys to preventing data corruption in your storage system.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

StorageCraft Technology Corporation

EMC VNXe Series
sponsored by EMC Computer Systems (UK) Ltd.
WHITE PAPER: The EMC VNXe series redefines networked storage for the small business to small enterprise user, delivering an unequaled combination of features, simplicity, and efficiency. This paper takes an in-depth look at the EMC VNXe series hardware and base software solutions.
Posted: 12 Feb 2011 | Published: 12 Feb 2011

EMC Computer Systems (UK) Ltd.

Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Tiered Storage Takes Center Stage (Horison)
sponsored by Oracle Corporation
WHITE PAPER: This paper describes how tiered storage, as a storage initiative, has been proven to significantly reduce acquisition and operating costs for medium and large scale storage enterprises. Read this paper to learn more about how tiered storage is taking center stage.
Posted: 21 Dec 2010 | Published: 21 Dec 2010

Oracle Corporation

A Practical Guide to Understanding and Deploying Cloud for the Enterprise
sponsored by Hitachi Data Systems
WHITE PAPER: While the promise of cloud is heady, there is confusion about the different types of cloud, what they actually offer, and which will meet stringent business requirements. Knowing when and how best to deploy cloud is critical. This paper focuses on separating the hype of cloud from the “how to”.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Hitachi Data Systems

Building A Network Foundation for Virtualization
sponsored by NETGEAR Inc.
WHITE PAPER: The deployment of virtualization technology has allowed businesses of all sizes to reduce costs and optimize resources. The impact has been particularly dramatic with server virtualization. By virtualizing their servers, many organizations have dramatically reduced their IT investment in hardware procurement. Read this white paper to learn more.
Posted: 04 Nov 2010 | Published: 04 Nov 2010


What is Tape Without Pain?
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra has extensive expertise with all forms of backup, and therefore understands the continuing and increasingly important role of tape in protecting data. To that end, Spectra Logic has set itself a goal: Tape Without Pain. Read this white paper to learn more about easing the tape backup process.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

Spectra Logic Corporation

Effective Storage Management and Data Protection for Cloud Computing
sponsored by IBM
WHITE PAPER: In Cloud Computing environments, applications reside in massively-scalable data centers where compute resources can be dynamically provisioned and shared to achieve significant economies of scale. Storage capacity scales with compute resources, and each needs to be effectively managed to gain the maximum benefits from Cloud.
Posted: 21 Oct 2010 | Published: 14 Sep 2010


John Webster whitepaper: IBM Smarter Planet Storage Solutions
sponsored by IBM
WHITE PAPER: Read this paper for information on data-generating technologies now available, the emerging applications that are harnessing them, and the desire among business executives across a broad range of industries to mine these applications for competitive advantage in some cases, and for the well-being of humanity in others.
Posted: 20 Oct 2010 | Published: 09 Jul 2010


Best Practices in Data Protection: Encryption, Key Management and Tokenization
sponsored by nuBridges, Inc.
WHITE PAPER: Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Posted: 12 Oct 2010 | Published: 12 Oct 2010

nuBridges, Inc.

End-to-End Choices in Tiered Storage Solutions
sponsored by Oracle Corporation
WHITE PAPER: Oracle's tiered storage strategy lets you effectively manage and store data across multiple types of storage media while reducing your total cost of ownership up to 54 percent. Oracle is the only technology leader to provide a scalable, end-to-end storage solution that aligns data value with the right combination of cost, performance, and capacity.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

Iron Mountain

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010


Anatomy of a Data Breach - Why Breaches Happen and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.
Posted: 23 Aug 2010 | Published: 18 Aug 2010

Symantec Corporation

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010


OCZ SSDs and Energy Efficiency: Improved performance and power savings through the benefits of innovative solid state storage solutions
sponsored by OCZ Technology Group, Inc.
WHITE PAPER: As the demand for information access has increased exponentially over the past decade to meet the growth of the Internet as whole, including e-commerce and commercial databases, the demand placed on datacenters has intensified. Read this paper to find out more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010

OCZ Technology Group, Inc.

The CIO's New Guide to Design of Global IT Infrastructure
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Is it possible to eliminate the impact of distance?  This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size.  Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster.
Posted: 22 Jun 2010 | Published: 22 Jun 2010

Riverbed Technology, Inc.

Linking identity and data loss prevention to avoid damage to brand, reputation and competitiveness
sponsored by CA Technologies.
WHITE PAPER: This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them.
Posted: 19 Jun 2010 | Published: 18 Jun 2010

CA Technologies.

LTO Tape Technology Continues to Evolve with LTO-5
sponsored by Overland Storage
WHITE PAPER: Read this FAQ featuring W. Curtis Preston, which outlines how Linear Tape-Open (LTO) tape differs from other tape media, the various generations of LTO and the pros and cons of this backup technology. Also learn about the newest model, LTO-5, being released this year.
Posted: 17 May 2010 | Published: 14 May 2010

Overland Storage

Designing Secure Multi-Tenancy into Virtualized Data Centers
sponsored by Continental Resources
WHITE PAPER: Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture.
Posted: 02 Apr 2010 | Published: 02 Apr 2010

Continental Resources

Delivering IT as a Service for Virtualized Data Centers
sponsored by Continental Resources
WHITE PAPER: Architecting a successful cloud computing infrastructure can be challenging. The secure cloud architecture offers the best products and features to create a cloud service that can realize the efficiencies of shared infrastructure while still offering the security, flexibility, resilience, and ease of management of a traditional IT deployment.
Posted: 01 Apr 2010 | Published: 01 Apr 2010

Continental Resources

Six Tips for Reducing Downtime in Travel and Transport
sponsored by Marathon Technologies
WHITE PAPER: Whether it's a security system, baggage handling application, order or vessel tracking downtime to applications supporting travel and transportation can throw off precisely timed schedules for travelers and shipments alike. This paper outlines six key tips for keeping travel and transportation logistics applications running without interruption.
Posted: 23 Feb 2010 | Published: 23 Feb 2010

Marathon Technologies

A Practical Guide to Cloud Computing Security
sponsored by Avanade
WHITE PAPER: Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.
Posted: 19 Feb 2010 | Published: 19 Feb 2010


How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

Five Cost-Effective Ways to Enable Fast Recovery
sponsored by i365, makers of Evault
WHITE PAPER: Data protection is about more than backup. It’s also about the ability to recover data in the event of loss, and to get back to business without delay. Read this white paper to learn 5 ways to ensure the most rapid return to operations and minimize data loss under each recovery scenario your company may face.
Posted: 11 Jan 2010 | Published: 11 Jan 2010

i365, makers of Evault
151 - 175 of 218 Matches Previous Page    5 6 7 8 9    Next Page
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement