IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security White Papers (View All Report Types)
151 - 175 of 195 Matches Previous Page  |  Next Page
A Practical Guide to Cloud Computing Security
sponsored by Avanade
WHITE PAPER: Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

Avanade

How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

Five Cost-Effective Ways to Enable Fast Recovery
sponsored by i365, makers of Evault
WHITE PAPER: Data protection is about more than backup. It’s also about the ability to recover data in the event of loss, and to get back to business without delay. Read this white paper to learn 5 ways to ensure the most rapid return to operations and minimize data loss under each recovery scenario your company may face.
Posted: 11 Jan 2010 | Published: 11 Jan 2010

i365, makers of Evault

12 Best Practices for Data Backup and Recovery
sponsored by i365, makers of Evault
WHITE PAPER: Read this white paper to learn about 12 best practices for data backup and recovery such as Reliability, Breadth of Offering, Security, Accessibility, Scalability, Cost-effectiveness and more!
Posted: 11 Jan 2010 | Published: 11 Jan 2010

i365, makers of Evault

PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks
sponsored by Absolute
WHITE PAPER: Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Absolute

You’re Not As Backed Up As You Think
sponsored by EMC Corporation
WHITE PAPER: Learn how to overcome the challenges of traditional data backup for your small to mid-size organization and discover the benefits of implementing a Software-As-A-Service (SaaS) backup solution.
Posted: 11 Dec 2009 | Published: 11 Dec 2009

EMC Corporation

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

The Business Impact of Data Security Regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Six Secrets to 24x7 Exchange Availability
sponsored by Marathon Technologies
WHITE PAPER: The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

Disaster Got You Down?
sponsored by CDW Corporation
WHITE PAPER: While trying to predict an outage is impossible, being prepared for one is not. Having the right tools in place to respond to a "disaster" is essential to sustaining a successful organization. A business-continuity / disaster-recovery plan can help you cut costs by avoiding downtime, lost revenue and dissatisfied customers.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

CDW Corporation

Guide: Secure Copy
sponsored by ScriptLogic Corporation
WHITE PAPER: Getting data moved over to a new server is more than merely copying the most recent files and folders to that machine. File security, permissions, shared folders and local groups facilitating access need to be maintained.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Coping with SAN Storage Frustration Caused by Server Virtualization
sponsored by NEC Corporation
WHITE PAPER: Read this paper to learn strategies to deal with server virtualization issues associated with storage networking.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

NEC Corporation

Achieving flexible storage scalability: The Case for Enterprise Modular Storage Arrays
sponsored by NEC Corporation
WHITE PAPER: For businesses on a data growth path, the management of storage creates numerous problems, including business disruptions when upgrading and the need for greater availability and scaling flexibility. This paper makes the case for enterprise modular storage arrays to achieve the flexible storage scalability businesses need.
Posted: 21 Aug 2009 | Published: 06 Aug 2009

NEC Corporation

Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness
sponsored by Sirius Computer Solutions
WHITE PAPER: IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.
Posted: 08 Jul 2009 | Published: 26 Jun 2009

Sirius Computer Solutions

BACKUP REDESIGN: Do More with Less ... Really!
sponsored by AppAssure Software, Inc.
WHITE PAPER: The call to protect corporate data in less time and for less money has inspired a whole new way of thinking about backup - a complete backup redesign. This paper explores a better way to backup and protect data and applications - disk-based application.
Posted: 10 Apr 2009 | Published: 10 Apr 2009

AppAssure Software, Inc.

Active Anti-Malware Protection: Self-Defending IronKey Flash Drives Stop MalWare and Viruses from Spreading to Computers and Networks
sponsored by IronKey
WHITE PAPER: Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

IronKey

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 24 Feb 2009 | Published: 24 Feb 2009

IBM

Monitoring Physical Threats in the Data Center
sponsored by Schneider Electric
WHITE PAPER: This paper describes the class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime.
Posted: 04 Feb 2009 | Published: 03 Feb 2009

Schneider Electric

IDC Technology Spotlight: Optimizing Storage to Reduce Data Footprint and Lower Costs
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines data deduplication technologies supported by the latest Storage Solutions from HP. Data deduplication is a hot topic in data protection and therefore, also a relevant topic for HP Data Protector software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Hewlett Packard Enterprise

Sun Microsystems How to Migrate from Microsoft Exchange 2000/2003 to Exchange Server 2007
sponsored by Incentra Solutions
WHITE PAPER: This guide documents the process for a typical migration to Microsoft Exchange Server 2007 along with a few critical considerations before the deployment takes place.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Incentra Solutions

Top Considerations for Implementing Secure Backup and Recovery
sponsored by Zmanda Inc.
WHITE PAPER: Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data.
Posted: 09 Jul 2008 | Published: 08 Jul 2008

Zmanda Inc.

IDC Opinion: The Economic Impact of File Virtualization - Reducing Storage Costs and Improving Management Efficiency
sponsored by F5 Networks
WHITE PAPER: Enterprises are adopting new strategies for building file-based storage solutions. In several interviews, IDC found that companies are increasing their file-based storage by 50-120% a year, placing a high priority on efficiency.
Posted: 28 Apr 2008 | Published: 01 May 2007

F5 Networks

Disaster Recovery: Identify Data Value for a Targeted DR Solution
sponsored by American Megatrends Inc.
WHITE PAPER: A disaster can strike at anytime and your organization is vulnerable. This white paper provides a complete outline - filled with tips and best practices - on creating the most effective disaster recovery plan for your company's needs.
Posted: 04 Apr 2008 | Published: 18 May 2007

American Megatrends Inc.

Data Protection Report 2008: Best Practices in Data Backup & Recovery
sponsored by Overland Storage
WHITE PAPER: This white paper outlines the survey results of over 135 storage professionals to understand the top goals, challenges and trends related to data protection in 2008. Read this white paper to learn what's in store for this year.
Posted: 12 Feb 2008 | Published: 01 Jan 2008

Overland Storage

New eGuide: How to Fully Protect Your Storage Environment
sponsored by Quantum Corporation
WHITE PAPER: Storage systems are severely susceptible to attack and it is time for organizations to rethink their security tactics. Read this eGuide to learn about concepts regarding storage security and solutions like encryption that can help defend against attack.
Posted: 28 Jan 2008 | Published: 28 Jan 2008

Quantum Corporation
151 - 175 of 195 Matches Previous Page    5 6 7 8    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement