IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityWhite Papers (View All Report Types)
51 - 75 of 246 Matches Previous Page  | Next Page
Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous
sponsored by Iron Mountain
WHITE PAPER: This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy.
Posted: 16 Jul 2013 | Published: 31 May 2013

Iron Mountain

Enabling Software Deduplication Across the Enterprise with HP Data Protector
sponsored by HP Autonomy
WHITE PAPER: This whitepaper dives deep into the topic of deduplication and outlines a solution that supports deduplication at any location to solve your data protection and backup woes. View now to learn more!
Posted: 12 Jun 2013 | Published: 29 Jun 2012

HP Autonomy

Legal Issues of Cloud Forensics
sponsored by Global Knowledge
WHITE PAPER: This white paper asks 5 essential questions about cloud forensics, revealing key issues a company or forensic examiner might face when collecting information from the cloud.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Global Knowledge

Protecting Vital Business Data from Natural Calamities
sponsored by Iron Mountain
WHITE PAPER: In this article, explore the case for business continuity and check out some stats proving how necessary a disaster recovery/business continuity plan is in today's treacherous physical and digital climates. Read on now to learn what to consider when making a DR/BC assessment and take the best actions to protect what's yours.
Posted: 30 Nov 2012 | Published: 16 Oct 2012

Iron Mountain

Sparking a Plan: Offsite Tape Storage and Smarter Protection Against the Elements
sponsored by Iron Mountain
WHITE PAPER: There's always a chance your data can be destroyed or damaged if it's only stored in one place, so while it's important to secure your on-site storage against the elements, it can't hurt to look into partnering with an off-site tape storage and data restoration pro. This article explains why.
Posted: 30 Nov 2012 | Published: 17 Oct 2012

Iron Mountain

Forrester Total Economic Impact Study of IBM Storwize V7000
sponsored by IBM
WHITE PAPER: In June 2011, IBM commissioned Forrester Consulting to examine the total economic impact and potential ROI that enterprises may realize by deploying Storwize V7000. Read this white paper to learn the results.
Posted: 16 Nov 2012 | Published: 30 Apr 2012

IBM

New Features Enable Cost-effective, Efficient Compression
sponsored by IBM
WHITE PAPER: This white paper explores how next-gen, real-time compression is changing the game by offering a robust, efficient, and cost-effective optimization solution. Read now to learn more.
Posted: 10 Sep 2012 | Published: 30 Apr 2012

IBM

Mitigating Security & Compliance Risks with EMM
sponsored by IBM.
WHITE PAPER: Due to potential threats to enterprise security that come along with workforce mobility, companies are discovering pitfalls from legal, competitive, and productivity standpoints.
Posted: 25 Jul 2012 | Published: 31 May 2014

IBM.

Protect Data in VMware-Based Environments with IBM Tivoli Solutions
sponsored by IBM
WHITE PAPER: This brief resource examines the challenges of traditional backup and storage approaches in virtual environments, and introduces a unified platform that enables your organization to meet these challenges and effectively store, analyze, manage, and protect data.
Posted: 07 Nov 2013 | Published: 31 Jul 2013

IBM

Unclutter Your Data Center With Consolidated Log Management
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.
Posted: 17 Oct 2013 | Published: 13 Jun 2013

VMware, Inc.

Top Reasons Why Customers Virtualize Their Desktops with VSPEX Proven Infrastructures
sponsored by EMC & Arrow
WHITE PAPER: Access this white paper today to learn the top reasons why so many customers virtualize their desktops with VSPEX proven infrastructures. Also, discover how to transform your end-user computing environment with simple, efficient, and flexible virtualization solutions.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

EMC & Arrow

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Generating Proven Business Value with EMC Next- Generation Back Up and Recovery
sponsored by EMC & Arrow
WHITE PAPER: This white paper explores a few next-gen backup and recovery solutions that have been easily and affordably deployed in companies across all industries.
Posted: 14 Jun 2013 | Published: 31 Oct 2011

EMC & Arrow

2013 Virtual Server Backup Software Buyer’s Guide
sponsored by CommVault Systems, Inc.
WHITE PAPER: This buyer's guide provides a comprehensive list of virtual server backup software solutions available today and explores what features they offer in the form of detailed, standardized data sheets that can assist you in making an informed decision in regards to your backup and recovery solutions.
Posted: 29 Apr 2013 | Published: 28 Feb 2013

CommVault Systems, Inc.

Before You Renew With Your Legacy Backup Software
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explores five questions to ask when choosing a backup solution. Discover key considerations that will enable you to make a smart and informed decision.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

CommVault Systems, Inc.

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment
sponsored by EMC
WHITE PAPER: This white paper reveals the benefits of virtual private cloud deployment and how one leading vendor's cloud virtualization technologies support the implementation of secure private cloud deployments of Microsoft Exchange Server and Microsoft SharePoint.
Posted: 17 Apr 2013 | Published: 28 Feb 2013

EMC

FalconStor® RecoverTrac™: Automated Service-oriented Disaster Recovery
sponsored by FalconStor Software
WHITE PAPER: This white paper explores a disaster recovery solution that gives you peace of mind by removing complexity from the equation. Read on to get a detailed account of FalconStor's RecoverTrac technology and how it can help you address a full range of disaster recovery challenges.
Posted: 16 Apr 2013 | Published: 04 Feb 2013

FalconStor Software

Infographic: Disaster Recovery Trends in 2013
sponsored by FalconStor Software
WHITE PAPER: Check out this one-page infographic that details the top trends in the realm of disaster recovery in 2013. You'll gain insight into: the current landscape, what the future holds, the importance of automated DR and more.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

FalconStor Software

Backup Transformation from the Inside
sponsored by EMC Corporation
WHITE PAPER: This white paper provides an insider's view of the need for and impact of backup transformation in today's ever-changing IT landscape.
Posted: 15 Apr 2013 | Published: 30 Nov 2012

EMC Corporation

Clustered SAN enables seamless scaling and greater storage efficiency
sponsored by NetApp
WHITE PAPER: Storage systems today must match agility with proven, diversified I/O performance to satisfy an enterprise's changing needs. NetApp has benchmarked superior I/O performance in their FAS6240 Clustered SAN storage array, resulting in its ranking as Silverton Consulting's Enterprise OLTP Champion of Champions™ for 1Q-2013.
Posted: 14 Mar 2013 | Published: 28 Dec 2012

NetApp

Protecting Healthcare Data in the Cloud: GNAX Health & Intel
sponsored by Intel
WHITE PAPER: This exclusive resource demonstrates how health care facilities can protect sensitive patient data in the cloud, while preserving the server performance that users require – all while ensuring compliance with HIPAA and HITECH.
Posted: 17 Oct 2012 | Published: 17 Oct 2012

Intel

Scale-Out NAS for Unstructured Data
sponsored by Red Hat
WHITE PAPER: This white paper introduces a scale-out NAS software solution for cloud environments designed to meet unstructured data requirements and provide a high-performance, virtualized and centrally managed storage pool. Able to scale both capacity and performance, you'll be able to achieve an unprecedented price/performance ratio without compromise.
Posted: 28 Sep 2012 | Published: 14 Feb 2012

Red Hat

VW Credit, Inc. Drives Better Backups with ExaGrid
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this brief case study today to explore one company's journey to better backups.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

ExaGrid Systems, Inc.

8 Considerations for Evaluating Disk-Based Backup Solutions
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this white paper for 8 critical considerations to keep in mind before deciding on a disk-based backup appliance. Explore the importance of backup, restore, dedupe and scalability capabilities when shopping for a backup solution, and gain the insight you need to make a confident and informed decision when it comes to backup.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

ExaGrid Systems, Inc.
51 - 75 of 246 Matches Previous Page    1 2 3 4 5 6    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement