IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityWhite Papers (View All Report Types)
151 - 175 of 228 Matches Previous Page  | Next Page
Getting Started With Email Archiving for Exchange - The Exchange 2010 Edition
sponsored by Sherpa Software
WHITE PAPER: This white paper discusses the reasons email archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 30 Mar 2011 | Published: 30 Mar 2011

Sherpa Software

Achieving Superior Manageability, Efficiency, and Data Protection with Oracle's Sun ZFS Storage Software
sponsored by Oracle Corporation
WHITE PAPER: Oracle's Sun ZFS Storage software is the key ingredient that enables Oracle's Sun ZFS Storage Appliances to deliver unmatched simplicity, ease-of-use, increased storage efficiency, and industry leading price/performance.
Posted: 21 Mar 2011 | Published: 01 Dec 2010

Oracle Corporation

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

Encouraging SharePoint Collaboration
sponsored by AvePoint, Inc.
WHITE PAPER: This paper discusses how Microsoft SharePoint is the platform of choice for organizations to store enterprise-wide content. New features in SharePoint Server 2010 take the platform to the next level by improving the platform’s scalability and usability to further enhance collaboration among knowledge workers.
Posted: 21 Feb 2011 | Published: 21 Feb 2011

AvePoint, Inc.

Five Keys to Preventing Data Corruption in Storage Environments
sponsored by StorageCraft Technology Corporation
WHITE PAPER: The lifeblood of a corporation is in the information that it generates and stores. Due to the increasing amount of data and information that an organization must protect, robust computer systems are essential for survival. Read this white paper to learn about the 5 keys to preventing data corruption in your storage system.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

StorageCraft Technology Corporation

Simpana® Software—A Unique Cloud-Enabled Platform
sponsored by CommVault Systems, Inc.
WHITE PAPER: Check out this white paper to see how Simpana software seamlessly extends local backup and archive to a new tier of cloud-based storage. Virtually unlimited storage capacity from out integrated cloud storage partners helps users dramatically reduce costs and operational complexity while improving long-term compliance.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

CommVault Systems, Inc.

EMC VNXe Series
sponsored by EMC Computer Systems (UK) Ltd.
WHITE PAPER: The EMC VNXe series redefines networked storage for the small business to small enterprise user, delivering an unequaled combination of features, simplicity, and efficiency. This paper takes an in-depth look at the EMC VNXe series hardware and base software solutions.
Posted: 12 Feb 2011 | Published: 12 Feb 2011

EMC Computer Systems (UK) Ltd.

Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Tiered Storage Takes Center Stage (Horison)
sponsored by Oracle Corporation
WHITE PAPER: This paper describes how tiered storage, as a storage initiative, has been proven to significantly reduce acquisition and operating costs for medium and large scale storage enterprises. Read this paper to learn more about how tiered storage is taking center stage.
Posted: 21 Dec 2010 | Published: 21 Dec 2010

Oracle Corporation

A Practical Guide to Understanding and Deploying Cloud for the Enterprise
sponsored by Hitachi Data Systems
WHITE PAPER: While the promise of cloud is heady, there is confusion about the different types of cloud, what they actually offer, and which will meet stringent business requirements. Knowing when and how best to deploy cloud is critical. This paper focuses on separating the hype of cloud from the “how to”.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Hitachi Data Systems

Building A Network Foundation for Virtualization
sponsored by NETGEAR Inc.
WHITE PAPER: The deployment of virtualization technology has allowed businesses of all sizes to reduce costs and optimize resources. The impact has been particularly dramatic with server virtualization. By virtualizing their servers, many organizations have dramatically reduced their IT investment in hardware procurement. Read this white paper to learn more.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

NETGEAR Inc.

What is Tape Without Pain?
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra has extensive expertise with all forms of backup, and therefore understands the continuing and increasingly important role of tape in protecting data. To that end, Spectra Logic has set itself a goal: Tape Without Pain. Read this white paper to learn more about easing the tape backup process.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

Spectra Logic Corporation

Effective Storage Management and Data Protection for Cloud Computing
sponsored by IBM
WHITE PAPER: In Cloud Computing environments, applications reside in massively-scalable data centers where compute resources can be dynamically provisioned and shared to achieve significant economies of scale. Storage capacity scales with compute resources, and each needs to be effectively managed to gain the maximum benefits from Cloud.
Posted: 21 Oct 2010 | Published: 14 Sep 2010

IBM

John Webster whitepaper: IBM Smarter Planet Storage Solutions
sponsored by IBM
WHITE PAPER: Read this paper for information on data-generating technologies now available, the emerging applications that are harnessing them, and the desire among business executives across a broad range of industries to mine these applications for competitive advantage in some cases, and for the well-being of humanity in others.
Posted: 20 Oct 2010 | Published: 09 Jul 2010

IBM

Best Practices in Data Protection: Encryption, Key Management and Tokenization
sponsored by nuBridges, Inc.
WHITE PAPER: Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Posted: 12 Oct 2010 | Published: 12 Oct 2010

nuBridges, Inc.

End-to-End Choices in Tiered Storage Solutions
sponsored by Oracle Corporation
WHITE PAPER: Oracle's tiered storage strategy lets you effectively manage and store data across multiple types of storage media while reducing your total cost of ownership up to 54 percent. Oracle is the only technology leader to provide a scalable, end-to-end storage solution that aligns data value with the right combination of cost, performance, and capacity.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

Iron Mountain

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010

Asigra

Anatomy of a Data Breach - Why Breaches Happen and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.
Posted: 23 Aug 2010 | Published: 18 Aug 2010

Symantec Corporation

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Mimecast

OCZ SSDs and Energy Efficiency: Improved performance and power savings through the benefits of innovative solid state storage solutions
sponsored by OCZ Technology Group, Inc.
WHITE PAPER: As the demand for information access has increased exponentially over the past decade to meet the growth of the Internet as whole, including e-commerce and commercial databases, the demand placed on datacenters has intensified. Read this paper to find out more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010

OCZ Technology Group, Inc.

The CIO's New Guide to Design of Global IT Infrastructure
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Is it possible to eliminate the impact of distance?  This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size.  Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster.
Posted: 22 Jun 2010 | Published: 22 Jun 2010

Riverbed Technology, Inc.

Linking identity and data loss prevention to avoid damage to brand, reputation and competitiveness
sponsored by CA Technologies.
WHITE PAPER: This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them.
Posted: 19 Jun 2010 | Published: 18 Jun 2010

CA Technologies.

LTO Tape Technology Continues to Evolve with LTO-5
sponsored by Overland Storage
WHITE PAPER: Read this FAQ featuring W. Curtis Preston, which outlines how Linear Tape-Open (LTO) tape differs from other tape media, the various generations of LTO and the pros and cons of this backup technology. Also learn about the newest model, LTO-5, being released this year.
Posted: 17 May 2010 | Published: 14 May 2010

Overland Storage

Designing Secure Multi-Tenancy into Virtualized Data Centers
sponsored by Continental Resources
WHITE PAPER: Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture.
Posted: 02 Apr 2010 | Published: 02 Apr 2010

Continental Resources
151 - 175 of 228 Matches Previous Page    5 6 7 8 9 10    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement