IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 473 Matches Previous Page  |  Next Page
Storage Snapshots: An Overview on the State of Data Recovery
sponsored by Reduxio
RESOURCE: This post serves as your condensed resource on snapshots, providing an overview on snapshots' history, innovation, and use cases, as well as snapshot usage limitations. Read on to also gain a strategy for surmounting the shortcomings of snapshots, using a technique called BackDating.
Posted: 14 Aug 2017 | Published: 04 May 2016

Reduxio

SaaS-based Billing Provider with Encryption Requirements Turns to Flash
sponsored by Kaminario
CASE STUDY: Download this study to see a snapshot view of how one organization overcame their encryption and capacity conundrums by implementing an all-flash array for their production databases, executing a 10X performance improvement, with built-in encryption to handle data-at-rest requirements.
Posted: 10 Aug 2017 | Published: 31 Aug 2016

Kaminario

New Flash Use Cases Identified and What to Do about the NAND Flash Shortage
sponsored by Kaminario
EGUIDE: Because we're in the midst of a worldwide NAND flash shortage, will once-lowered costs now rise? Download this guide as our editors evaluate the impact the NAND flash shortage has on the cost of SSDs (and how that compares per gigabyte to HDDs), as well as new use cases like flash as RAM.
Posted: 09 Aug 2017 | Published: 03 Aug 2017

Kaminario

SaaS Express: Immediate Response for K2 Powered Loyalty Programs
sponsored by Kaminario
CASE STUDY: Read this study to gain a condensed view of how Exchange Solutions cut overall response times by half and storage platform response times by 80% with Kaminario K2 all-flash-arrays, with integrated data-at-rest encryption, deduplication, and compression to meet their stringent security and PCI requirements.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Kaminario

This Year's Solid-State Array Market Overview
sponsored by IBM
ANALYST REPORT: Download this report to simplify your vendor evaluation of this year's solid state array (SSA) market, wherein analysts do all the heavy-lifting and break down each SSA vendor's market positioning. You'll view the market as a whole, as well as the strengths and drawbacks of 11 SSA providers, here.
Posted: 02 Aug 2017 | Published: 13 Jul 2017

IBM

Powering the High-Performance Cloud with FlashSystem
sponsored by IBM
WHITE PAPER: Read this white paper to discover an all-flash storage system that seamlessly integrates with high-performance cloud and virtualization platforms and supports numerous ypervisors, including VMware, IBM PowerVM, Microsoft Hyper-V and Citrix Xen.
Posted: 01 Aug 2017 | Published: 30 Jun 2016

IBM

Impact of General Data Protection Regulation on Storage Systems
sponsored by IBM
WHITE PAPER: Examine the impact the GDPR will have on your storage systems, and learn to mitigate the risk of data breach from uncontrolled access with media-level data encryption for flash and legacy storage media, geographically dispersed data, and more. Download now to ensure your organization is GDPR-compliant.
Posted: 31 Jul 2017 | Published: 31 May 2017

IBM

IBM FlashSystem: What Implementation Means for the Future of IT
sponsored by IBM
WHITE PAPER: Can your storage system handle high-performing apps that require ultra-low latency? Access this white paper to learn how flash storage implementation not only affects these apps, but can also bolster infrastructure security to prevent data breaches. Moreover, discover the details of one SSD, IBM FlashSystem, inside.
Posted: 31 Jul 2017 | Published: 31 Dec 2016

IBM

SearchStorage Editors Examine the Leading All-flash Array Vendors
sponsored by Pure Storage
EGUIDE: In this e-guide, we evaluate eight leading AFA vendors to let you decide which products best suit your organization. Read on as Logan Harbaugh, IT consultant and freelance reviewer with SearchStorage, breaks down how to select an AFA vendor based on functional specification, 3 essential purchasing considerations, and more.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

Pure Storage

Analyst Report: Evaluating the 2017 Solid-State Array Market
sponsored by Pure Storage
ANALYST REPORT: Download this report to simplify your vendor evaluation of the 2017 solid state array (SSA) market, wherein analysts do all the heavy-lifting and break down each SSA vendor's market positioning. You'll view the market as a whole, as well as the strengths and drawbacks of 11 SSA providers, here.
Posted: 20 Jul 2017 | Published: 13 Jul 2017

Pure Storage

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

The Business Value of Storage Simplicity
sponsored by Pure Storage
RESEARCH CONTENT: Download this 451 Research paper to discover how all-flash array implementation proactively eliminated time-consuming array tuning, disruptive hardware upgrades, and slow provisioning, and how survey respondents are using AFAs to reduce this disruption. You'll also learn the top 5 benefits yielded from SSD implementation.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

Pure Storage

Critical Capabilities for Solid-State Arrays: An Industry Analyst Perspective
sponsored by Pure Storage
ANALYST REPORT: Solid state arrays are more affordable than you think: In this report, Gartner analyzes 11 SSAs across six high-impact use cases. Read on to choose an SSA that provides the performance, RAS, multitenancy and security, and scalability you need without breaking IT's budget.
Posted: 11 Jul 2017 | Published: 31 Aug 2016

Pure Storage

IBM Storwize All-Flash Storage Systems Data Sheet
sponsored by IBM Tectight
DATA SHEET: This data sheet offers you an in-depth technical perspective on cost-effective IBM Storwize all-flash storage systems. Read on to discover how to meet demanding data storage requirements with an SSD solution that can improve core app response times, drive down TCO, and more.
Posted: 30 Jun 2017 | Published: 31 Dec 2016

IBM Tectight

Your Introduction to the IBM Flash Family
sponsored by IBM Tectight
DATA SHEET: Download this easily accessible sheet to gain a compact overview of the IBM FlashSystem Family, a comprehensive portfolio of all-flash storage systems that will support a diverse set of cloud tenants, maximize storage efficiency with data reduction for VDI, and more.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

IBM Tectight

SSDs: Fast Storage Made Simple—and Economical
sponsored by IBM Tectight
RESOURCE: Download this infographic to get a snapshot view of all-flash storage arrays that deliver simply consistent performance, more than 5x data reduction with inline pattern removal, data-at-rest encryption across all managed data sets, and more. Here's your chance to mitigate your storage architecture complexities.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

IBM Tectight

Differentiating All-flash Array Vendors from their Counterparts
sponsored by Tegile
EGUIDE: Our experts compiled this guide to determining the most suitable AFA vendor for your enterprise—ensuring you choose one that not only provides snapshots and thin provisioning, but also active-active controllers and replication, and QoS. Read on to also gain access to instruction for a three-phase AFA implementation.
Posted: 26 Jun 2017 | Published: 19 Jun 2017

Tegile

3 Data Storage Challenges in the Education Industry
sponsored by Reduxio
WHITE PAPER: In this white paper, learn about the 3 pillars of storage management IT pros working in the education industry need to improve in order to keep up with the rapidly changing IT landscape.
Posted: 21 Jun 2017 | Published: 08 May 2017

Reduxio

Ransomware - Sit Back & Relax
sponsored by Reduxio
WEBCAST: Watch this webcast where 3 IT experts explore the benefits of a backup system which can help reduce RTOs, simplify deduplication, automate data tiering and much more to help you reduce the impact of a ransomware attack.
Posted: 21 Jun 2017 | Premiered: Jun 14, 2017, 01:00 EDT (05:00 GMT)

Reduxio

How Barnstable PD Recovered from a Ransomware Attack
sponsored by Reduxio
RESOURCE: Read this interview with Craig Hurwitz, the director of IT for Barnstable Police Department in Massachusetts, where he explains how he was able to get his system back online in just 35 minutes after being hit by a ransomware attack, and offers advice to other pros planning their next backup system.
Posted: 21 Jun 2017 | Published: 03 Oct 2016

Reduxio

Mr. Robot and Today's New Data Protection
sponsored by Reduxio
WHITE PAPER: Read this white paper to learn about a data protection technology that uses point-in-time copying techniques like split-mirror backups and snapshots to keep your company safe from malware that could hold your information hostage.
Posted: 21 Jun 2017 | Published: 09 Jan 2017

Reduxio

Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns
sponsored by SanDisk Corporation
EGUIDE: This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.
Posted: 21 Jun 2017 | Published: 15 Jun 2017

SanDisk Corporation

The Business Value of NVMe
sponsored by Tegile
WHITE PAPER: Download this resource to closely examine the definition and business value of NVMe, with details on scaling with NVMe/F, implementation use cases like VDI, ERP systems, and Microsoft SQL Server illustrated, and more.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Tegile

Increased Security Through The Use Of Flash-Based SEDs
sponsored by Micron
WHITE PAPER: If you find yourself torn between a strong encryption program, and the storage performance you were promised with an SSD array, click inside and learn about how modern self-encrypting-drives (SED) can do both by encrypting data on the device itself.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Micron

Fast Track Containers to Production
sponsored by Diamanti
WHITE PAPER: Discover how to fast track containers to production, increase your scalability, address containerized app requirements with converged infrastructure, enable automatic persistent storage for containers, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Diamanti
1 - 25 of 473 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement