IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
1 - 25 of 480 Matches Previous Page  | Next Page
Protecting Mission-Critical Application Environments
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper discusses mission-critical application backup and recovery, proposing a shift to a more intelligent and adaptive backup and recovery framework that incorporates application awareness, storage integration, and operational analytics.
Posted: 24 Oct 2014 | Published: 26 Sep 2014

Hewlett-Packard Limited

Make storage stress-free
sponsored by Hewlett-Packard Limited
WHITE PAPER: Learn more about how you can resolve your storage challenges without increasing your budget or creating steep learning curves. Identify your key limitations by consulting this resource and learning where you can improve.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Hewlett-Packard Limited

Buyer's Guide to Eneterprise File Sync and Share (that users will love)
sponsored by Code42
WHITE PAPER: Read this buyer's guide to evaluate sync/share solutions and ensure you choose one that aligns with your users' needs and your organizations' preferences.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Code42

Tips for Securing ePHI in the Cloud
sponsored by Peak 10
WHITE PAPER: In this white paper, get tips for storing your ePHI in the cloud. Discover the top considerations to keep in mind when looking for a trusted provider.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Peak 10

The Increasing Value of Data in Australia: Privacy, Security and Compliance
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: Access this video to learn how 150 other organizations are evolving in terms of data management. You'll also learn about new technologies as well as areas where organizations are still frequently exposed to risks.
Posted: 01 Oct 2014 | Premiered: 03 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Case Study: Backup with data deduplication technology and rapid restore
sponsored by Fujitsu and NetApp
WHITE PAPER: Read this case study to find out what solution the Statistical Office deployed that offers data deduplication technology. Find out how they considerably reduced the necessary storage capacities for data storage and enabled rapid data storage and restore with speeds of up to 3.6 TB/h.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Fujitsu and NetApp

Hitachi Solutions for Data Protection
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: Access this video to learn how Hitachi solutions for Data Protection address the challenges presented by exponential data growth and server virtualization. This demo also explains how Hitachi's unique approach leverages replication, backup and archive to overcome the most pressing data center challenges.
Posted: 30 Sep 2014 | Premiered: 23 Oct 2012

NTT Communications ICT Solutions and Hitachi Data Systems

Examine the Increasing Value of Data
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: In this video, Julian Badell from NTT ICT and Andrew McGee from Hitachi Data Systems have been interviewed by Sky News Business on the responsibilities of data custodianship and how organizations are handling this new currency. View now to learn how new privacy laws are changing the way organizations handle their data.
Posted: 30 Sep 2014 | Premiered: 14 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Data Deduplication: Types and Benefits
sponsored by Dell Software
EGUIDE: In this e-guide, learn from expert Rachel Dines, an analyst with Forrester Research, the differences between software and hardware backup deduplication, post process vs. inline deduplication as well as fixed and variable-block length dedupe.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Dell Software

Hyperstore and Citrix CloudPlatform Powered by Apache: Delivering Enterprise Ready Hybrid Cloud Storage
sponsored by Citrix Ready and Cloudian
WEBCAST: Join us as we discuss how Cloudian Hyperstore + Citrix CloudPlatform delivers a best-in-class hybrid cloud storage solution that meets the demands of the enterprise.
Posted: 28 Aug 2014 | Premiered: Oct 15, 2014, 01:00 EDT (05:00 GMT)

Citrix Ready and Cloudian

Hitachi Content Platform: Solve Data Protection and Security Issues for Big Data and Cloud
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: This paper highlights the benefits of Hitachi Content Platform, and thoroughly examines data protection and security must-haves for solving enterprise data challenges.
Posted: 22 Aug 2014 | Published: 30 Sep 2013

NTT Communications ICT Solutions and Hitachi Data Systems

10 reasons to upgrade to Symantec Backup Exec™ 2014 today!
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the top 10 reasons to upgrade a backup and recovery solution and leverage next-level protection for environments that are either physical, virtual, or a combination of both.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Symantec Corporation

The Increasing Value of Data in Australia
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: This brief infographic gives survey results from 150 organizations and explores more about the impact of changes in regulations.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Privacy, Security and Compliance - What You Don’t Know May Just Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

How to Secure Content Outside the Data Center
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: This white paper examines the pain points that organizations face when it comes to securing content outside of the data center. It also explores a hybrid clout solution built to deliver the requisite capabilities and experience without sacrificing security.
Posted: 18 Aug 2014 | Published: 30 Jun 2014

NTT Communications ICT Solutions and Hitachi Data Systems

CIO survey All's not well at endpoints
sponsored by HP Autonomy
WHITE PAPER: This white paper explores the current endpoint security landscape and gives tips to help strike a balance between user experience for mobile workers and security requirements and control for IT.
Posted: 12 Aug 2014 | Published: 05 Mar 2014

HP Autonomy

Clabby Analytics: When Failures and Breaches Are NOT Options
sponsored by IBM
WHITE PAPER: The following research report describes how and why mainframes are different and preferred over different server architectures in the areas of microprocessor characteristics, systems design and related software. Click and learn why the mainframe is the "go-to" architecture when it comes to securing data and avoiding breaches.
Posted: 10 Jul 2014 | Published: 31 Mar 2014

IBM

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

Wherever it Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: Check out this white paper to learn your options for delivering better backup and security for the data stored on your workforce's devices. You'll also learn how you can deliver an architecture that scales with market/client demand and empowers you with business-grade tools – without sacrificing the experience of the end user.
Posted: 07 Jul 2014 | Published: 30 May 2014

Code42

Top Five Benefits of Image-Based Backup
sponsored by Datto, Inc.
WHITE PAPER: This white paper explains the benefits of image-based backup over traditional methods. Image-based backup provides faster and more reliable data recovery and protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Datto, Inc.

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

HP Simply StoreIT Backup and Data Protection ChalkTalk
sponsored by HP and Intel
WEBCAST: This short video provides a backup and data protection plan that has tape and disk-based backup solutions. Watch to see why you need to take action and be comfortable and confident in your protection plan.
Posted: 26 Jun 2014 | Premiered: Mar 25, 2014

HP and Intel

Why StoreOnce Federated Deduplication Matters to HP—and Should to You, Too
sponsored by HP and Intel
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HP and Intel

EMC vs. Oracle: Examining Storage Systems for Your Backup Environment
sponsored by Oracle and Intel®
WHITE PAPER: This resource explores a backup and restore system that will offer your organization layers of data protection and integrity while providing you the peace of mind to focus on your business and not your data security.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Oracle and Intel®

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation
1 - 25 of 480 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement