IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 472 Matches Previous Page  |  Next Page
Top Reasons Why Customers Deploy Flash Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.
Posted: 30 Nov 2016 | Published: 30 Apr 2016

TechData - EMC

Top Reasons Why Customers Deploy Hybrid Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 29 Nov 2016 | Published: 30 Apr 2016

TechData - EMC

IBM FlashSystem: Powering the Future of IT
sponsored by IBM
WHITE PAPER: This white paper explains how flash storage can provide the performance and security needed to run these apps and prevent data breaches. Access now and discover how flash can help 5 key drivers of info technology: cloud, data analytics, mobile and social engagement and security.
Posted: 23 Nov 2016 | Published: 30 Jan 2015

IBM

Five Myths About Encrypted SSDs
sponsored by Micron Technology
RESOURCE: Encryption of stored data is widely accepted as an effective and efficient way to protect sensitive information on self-encrypting drives (SEDs). However, there are numerous myths and misconceptions still prevalent. Check out this blog post and discover the truth behind the 5 most prevalent myths revolving around encrypted SSDs.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Micron Technology

10 Reasons You Should Consider Commvault for Data Protection
sponsored by Commvault
WHITE PAPER: Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Commvault

Building a Next-Gen Storage Infrastructure for SaaS Applications
sponsored by NetApp
PRESENTATION TRANSCRIPT: Access this expert resource to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

NetApp

Remote and Branch Offices: Leveraging Modern Storage and Data Centers
sponsored by Veeam Software
WHITE PAPER: This white paper explores how remote and branch offices (ROBOs) can build the modern data center, a highly virtualized environment that leverages up-to-date storage and has a cloud strategy in place. Uncover useful tips and options for setting up critical systems like backup, recovery, replication, and more.
Posted: 17 Nov 2016 | Published: 16 Nov 2016

Veeam Software

Cloud Steps Up as a Data Storage Platform
sponsored by Oracle Corporation UK Ltd
RESEARCH CONTENT: Storage requirements are growing by leaps and bounds, leading more organizations to turn to the cloud in an attempt to manage the load. This extensive report relates the key findings of an Independent Oracle Users Group (IOUG) survey. Find out how the cloud is impacting critical areas like data protection, data volumes, flash storage and more.
Posted: 15 Nov 2016 | Published: 31 May 2016

Oracle Corporation UK Ltd

The Guide to Modern Endpoint Backup and Data Visibility
sponsored by Code42
WHITE PAPER: This white paper explores modern endpoint backup strategies with heightened visibility and insight to help provide protection across multiple devices and data migration. Uncover 15 essential traits of reliable data security platforms, including end-user data protection across multiple OS, end-user data control via the cloud, and more.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Code42

How to Save Storage Space with Purposeful Backups
sponsored by Veeam Software
WHITE PAPER: Discover how to effectively reduce storage capacity when performing backups by combining the strategies outlined here for flexible and powerful data protection. Based on your needs, learn when you should prioritize SLA over storage (and vice versa), best practices when backing up to tape, and more.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Veeam Software

10 Essential Best Practices for Virtual Server Backups
sponsored by Computerworld Business Solutions
EBOOK: This e-book explores the specific challenges of creating a data protection and backup strategy for virtual servers. Uncover 10 helpful best practices that will boost your disaster recovery strategy, like making use of hypervisor tools, using snapshots responsibly, and 8 more.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

Computerworld Business Solutions

Resume Business Faster with Engineered Oracle Database Recovery
sponsored by Oracle Corporation UK Ltd
VIDEO: This brief video examines the only backup and recovery system co-engineered with Oracle databases and Oracle cloud. Access now to discover a zero data loss recovery appliance that will minimize the time it takes to recover your databases fully with cloud-connected automated backups that eliminate silos and vastly improve user experiences.
Posted: 08 Nov 2016 | Premiered: 26 Oct 2016

Oracle Corporation UK Ltd

Utilizing Data-aware Storage in the Age of Convergence
sponsored by IBM
EGUIDE: Access the latest on converged, data-aware storage architectures, which seek to improve performance optimization through smart deduplication and compression schemes, app-aligned caching and tiering, policy-definable QoS, and data protection schemes. Additionally, discover why flash is crucial to convergence.
Posted: 03 Nov 2016 | Published: 27 Oct 2016

IBM

Storage Networking Technology Steps Up to Overcome Performance Challenges
sponsored by IBM
EGUIDE: Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.
Posted: 02 Nov 2016 | Published: 26 Oct 2016

IBM

Holistic Data Protection Center: Reduce Your Costs and Downtime
sponsored by Commvault
VIDEO: Access this video case study to learn how Salem Health implemented a stronger data protection strategy to minimize downtime, accelerate recovery, reduce costs, and achieve compliance with ease.
Posted: 31 Oct 2016 | Premiered: 31 Oct 2016

Commvault

Computer Weekly – 1 November 2016: The future of connected cars
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how software is reshaping the car industry, with internet-connected cars presenting challenges and opportunities. IT suppliers are putting up prices in the UK as the value of the pound falls – we look at the implications. And Eurostar's digital chief talks about his IT overhaul. Read the issue now.
Posted: 28 Oct 2016 | Published: 01 Nov 2016

ComputerWeekly.com

10 Signs You've Outgrown Your Current Backup and Recovery Solution
sponsored by Commvault
WHITE PAPER: This white paper provides you with 10 signs you've outgrown your current data protection strategy. Find out if your backup and recovery systems are getting the job done or if it's time to consider migrating to a newer, more holistic platform.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Commvault

Data Protection in Two Dimensions
sponsored by EOH IBM
WHITE PAPER: Discover a better approach to SSD data protection. Learn how to implement two independent dimensions of data protection, monitor your flash media's health, managed flash failures efficiently and optimize the utilization of all your flash resources.
Posted: 27 Oct 2016 | Published: 01 Jan 2016

EOH IBM

5 Essentials for Achieving Cloud Archiving Success
sponsored by Mimecast
WHITE PAPER: Learn five essentials for achieving cloud archiving success, including guidance on how to avoid common misconceptions about cloud email archiving, and how to prepare for e-discovery and litigation with a secure storage solution.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Mimecast

Oracle Database Recovery Strategy
sponsored by Oracle Corporation UK Ltd
WEBCAST: This webcast explores how to implement a backup and recovery strategy specifically designed to protect Oracle databases. Learn about a converged Oracle infrastructure that incorporates archiving, backup, and flash storage to enable fast, reliable data recovery and discover how Oracle's recovery appliance can improve your protection strategy.
Posted: 25 Oct 2016 | Premiered: Apr 14, 2016

Oracle Corporation UK Ltd

Product Demo: Quorum 1-click Recovery
sponsored by QuorumLabs Inc.
WEBCAST: When server has a melt-down, the last thing you need in this stressful event is a complicated disaster recovery process. In this 4 minute demo, learn about a one-click disaster recovery software that simplifies backup and continuity enabling businesses to safeguard their revenue, customers and reputation.
Posted: 24 Oct 2016 | Premiered: Sep 7, 2012

QuorumLabs Inc.

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 24 Oct 2016 | Published: 25 Oct 2016

ComputerWeekly.com

Beyond Silos: Meeting the Healthcare Data Management Challenge
sponsored by Dell EMC
WHITE PAPER: Reduce data management complexities in your healthcare organization. Examine a scale-out NAS solution that will accommodate expanding data growth and optimize storage utilization.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Dell EMC

What Keeps CIOs Awake at Night: Risk Reduction and Data Recovery
sponsored by Commvault
VIDEO: This video explores how one backup and recovery system helps increase businesses' confidence in their ability to protect critical data. Find out what Phil Goodwin, a research director at IDC, has to say about alleviating the fears of IT leaders and storage pros.
Posted: 24 Oct 2016 | Premiered: 08 Mar 2016

Commvault

Software-Defined Storage Suite Transforms Data Capabilities
sponsored by IBM
VIDEO: In today's rapidly changing business environment, data management is becoming a serious challenge for many companies. This video discusses one Software-Defined Storage suite designed to change the economics of storage. Watch now to learn about this suite and how it can store data at optimal cost, helping to maximize performance and ensure security.
Posted: 21 Oct 2016 | Premiered: 22 Dec 2015

IBM
1 - 25 of 472 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement