IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityWhite Papers (View All Report Types)
76 - 100 of 235 Matches Previous Page  | Next Page
Fast Track to Archived Data Access
sponsored by Iron Mountain
WHITE PAPER: Read this paper for best practices and keys to help you prepare for a compliance or audit request. Learn how an offsite partner can help improve your data protection, accessibility and recoverability, and receive 7 keys to help improve your security and backup policies. Also receive checklist of 4 keys to help you better access your information.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Backup Partner Criteria for Smart Partnerships
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover how an offsite storage partner can be the answer to your content security and storage challenges. Learn about the advantages associated with offsite storage, discover how to define your needs and find the best potential backup partner you can, receive 4 key questions to ask regarding storage partners and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Is Your Complete Restoration Plan on Track?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Risk Management: How Vulnerable is Your Backup Media?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for tips to help you securely manage backup and recovery processes. Discover the importance of developing a chain of custody when it comes to data, learn how authorization and access restrictions can help keep your information secure, and receive best practices for choosing an offsite data backup/protection partner.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Plan Now, Worry Less After
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a guide to compiling a successful post-disaster checklist. Receive 4 post-disaster musts, learn 3 keys to staying afloat following a disaster, discover the importance of internal communication during downtime and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Send Your Tapes to a Better Climate
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a checklist of key questions to ask before choosing an offsite tape storage partner. Learn what the ideal requirements for tape storage are, discover what you should be looking for in a potential storage partner and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

When It's Time for an Audit, Will You Be Ready?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices on how to best prep yourself for the audit process - learn how to create a backup and recovery plan that includes the right audit and accountability features, discover four keys to help you on the path to compliance and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Overcome 5 Common Backup Challenges With Tape
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn where tape stands today among other storage media, and discover where tape may fit into your backup infrastructure.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Who's Got the Talent? Build an A-List Backup Team
sponsored by Iron Mountain
WHITE PAPER: The key to a successful disaster recovery strategy is planning. Read this white paper to learn about the importance of being proactive about potential problems, discover how you can properly rehearse for disaster and understand the importance of knowing who's in charge of what when the time comes. Read on for more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Should You Chase the Cloud?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn how you might want to include cloud technologies as part of a complete data backup and recovery strategy. Discover three steps to take to determine if the cloud is right for you, learn about security concerns and more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Remote and Branch Office Backup and Recovery 101
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices when planning and managing a comprehensive offsite backup and recovery strategy. Learn how careful planning with remote or branch offices (ROBOs) can allow for seamless data protection without compromise, and discover key questions to ask when planning remote office backup strategies.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Encryption Strategies: Decoded
sponsored by Iron Mountain
WHITE PAPER: Find out exactly how and why in this white paper. Discover best practices for determining what data is most important and should be encrypted, learn exactly how encryption works and receive a checklist of three critical aspects of any encryption plan. Read on to learn more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Eguide: Why Choosing a Data Protection Solution is Critical
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn about the importance of proper data protection practices and receive tips to help you devise the best strategy to protect your most important information. Read on to learn more.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Which Way to the Vault? Hassle-free Tape Backups
sponsored by Iron Mountain
WHITE PAPER: Loaded with a step-by-step list of how to prepare, move and keep tabs on your data, along with four best practices for moving data to an offsite vault, this resource has the information you need to ensure you're properly transporting and managing offsite tapes.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Secure Tape Vaulting Strategies for Serious Data Protection
sponsored by Iron Mountain
WHITE PAPER: Your tapes deserve the best protection possible. Ensure they get it by reading this white paper filled with best practices for keeping data safe and secure. Discover the benefits associated with data housed onsite vs. offsite, learn 3 key questions to ask regarding your existing backup strategy, discover four keys to tape success and more.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Selecting a Cloud Storage Solution: Comparing Box and Egnyte
sponsored by Egnyte
WHITE PAPER: This white paper is here to break down two of today's cloud offerings - Egnyte and Box. Read on for a full comparison of the features and benefits these two solutions offer, discover best practices to help you ensure a smooth transition to the cloud and more.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

Egnyte

The Data Archive Challenge: What’s Your Game Plan?
sponsored by Horison Information Strategies
WHITE PAPER: Learn how you can overcome the challenges associated with effectively archiving information in today's data-intensive IT environments. Learn about different types of archiving strategies, discover an emerging method known as hierarchical storage management (HSM), receive a step-by-step guide for building a long-term, scalable data archive and more.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

Horison Information Strategies

Quantum vmPRO Software: All-in-One Protection Solution for Virtual Machines
sponsored by Quantum Corporation
WHITE PAPER: Check out this white paper to discover an integrated hardware/software solution designed to provide a complete data protection solution for your VMs. Included in this brief paper is an introduction to the features and benefits of this security solution.
Posted: 12 Mar 2012 | Published: 01 Nov 2011

Quantum Corporation

Five Things You Need to Know About Disaster Recovery Planning
sponsored by NetIQ
WHITE PAPER: Check out this white paper for 5 things you must know about DR planning. Learn how virtualisation and cloud technologies are affecting DR processes, discover how to measure the ROI of disaster recovery, receive best practices for effective planning and testing and more.
Posted: 09 Mar 2012 | Published: 09 Mar 2012

NetIQ

Storage Economics eGuide: Investing in the right technology to reduce costs
sponsored by Hitachi Data Systems
WHITE PAPER: This white paper may have the answer. Read on to explore the concept of storage economics, the idea that careful calculation and remapping of your existing storage infrastructure can allow you to both improve performance and lower TCO. Read on to learn more.
Posted: 07 Mar 2012 | Published: 07 Mar 2012

Hitachi Data Systems

Storage Data Protection Strategies In Today’s Data Center
sponsored by Oracle Corporation
WHITE PAPER: An increasing number of organizations are looking at how choosing the right storage platforms contributes to data protection and high-availability and helps ensure minimal planned and unplanned downtime or even continuous operations. Read this white paper to learn all about data protection and how it applies to your business.
Posted: 07 Mar 2012 | Published: 18 Jan 2012

Oracle Corporation

Storage and the Private Cloud: Taking Virtualization to the Next Level
sponsored by Oracle Corporation
WHITE PAPER: This paper describes how virtualization has affected storage technologies and how Oracle’s storage solutions enable organizations to reduce IT costs, accelerate provisioning of private cloud services and achieve higher service levels.
Posted: 07 Mar 2012 | Published: 15 Feb 2012

Oracle Corporation

Getting Real About Virtual Backup and Recovery
sponsored by Acronis
WHITE PAPER: Check out this white paper to learn about the latest trends in virtualisation technology and discover what impact these improvements will have on backup and disaster recovery operations. Learn about the latest in off-site backups, data protection for virtual environments and more.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

Acronis

Intelligent Service Automation Working with Service Oriented Architecture
sponsored by Kaminario
WHITE PAPER: The dependency of background (batch) processing still remains when your applications move to a service oriented architecture (SOA). Read this white paper to learn how to ease the SOA transition with technology that enables the inclusion of background processing.
Posted: 05 Mar 2012 | Published: 31 Dec 2010

Kaminario

Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain
76 - 100 of 235 Matches Previous Page    2 3 4 5 6 7    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement