IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
1 - 25 of 493 Matches Previous Page  | Next Page
Clabby Analytics: When Failures and Breaches Are NOT Options
sponsored by IBM
WHITE PAPER: The following research report describes how and why mainframes are different and preferred over different server architectures in the areas of microprocessor characteristics, systems design and related software. Click and learn why the mainframe is the "go-to" architecture when it comes to securing data and avoiding breaches.
Posted: 10 Jul 2014 | Published: 31 Mar 2014

IBM

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

Enterprise Mobility: A Checklist for Secure Containerization
sponsored by Code42
WHITE PAPER: Containerization is a security method that separates enterprise applications and data from personal applications and data. This white paper explains the pros and cons of various approaches to containerization.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Evaluating Cloud Data Backup Services and Modern Trends
sponsored by Carbonite
EGUIDE: This expert e-guide explores the trends that will affect the backup and data protection market in the near future. Additionally, it examines cloud data backup services that are available today.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Carbonite

Wherever it Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: Check out this white paper to learn your options for delivering better backup and security for the data stored on your workforce's devices. You'll also learn how you can deliver an architecture that scales with market/client demand and empowers you with business-grade tools – without sacrificing the experience of the end user.
Posted: 07 Jul 2014 | Published: 30 May 2014

Code42

A Practical Introduction to Enterprise Mobility Management
sponsored by Code42
WHITE PAPER: Check out this white paper to get a breakdown of how mobile device management (MDM) and mobile app management (MAM) can address today's challenges. Read on to get guidelines on how enterprise mobility management technology applies to your environment.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Code42

Client Management Checklist
sponsored by Code42
WHITE PAPER: Access this checklist to learn how you can overcome the common challenges of Apple-ization by covering all your bases while also providing a proper experience for your user base. You'll get tips on five areas that can help you get more out of new technologies while allowing your users to do even more than before.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Code42

Enterprise Endpoint Backup Checklist
sponsored by Code42
WHITE PAPER: Check out this white paper to learn the 12 must-have features for enterprise endpoint backup restores and management.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Code42

Top Five Benefits of Image-Based Backup
sponsored by Datto, Inc.
WHITE PAPER: This white paper explains the benefits of image-based backup over traditional methods. Image-based backup provides faster and more reliable data recovery and protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Datto, Inc.

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

HP Simply StoreIT Backup and Data Protection ChalkTalk
sponsored by HP and Intel
WEBCAST: This short video provides a backup and data protection plan that has tape and disk-based backup solutions. Watch to see why you need to take action and be comfortable and confident in your protection plan.
Posted: 26 Jun 2014 | Premiered: Mar 25, 2014

HP and Intel

Why StoreOnce Federated Deduplication Matters to HP—and Should to You, Too
sponsored by HP and Intel
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HP and Intel

New Possibilities for Guarding Your Workforce Data
sponsored by Code42
VIDEO: ESG Senior Analyst Jason Buffington discusses IT's responsibility to protect endpoint data, whether BYOD or corporate-issued. He also highlights the benefits of Backup-as-a-Service solutions.
Posted: 13 Jun 2014 | Premiered: 29 May 2014

Code42

Explore the Challenges of Backing Up Virtual Servers
sponsored by Dell, Inc.
EGUIDE: This expert e-guide examines why backing up virtual serves presents challenges for IT pros. It explains why the problems exist and what backup vendors offer that will address some of these challenges.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Dell, Inc.

EMC vs. Oracle: Examining Storage Systems for Your Backup Environment
sponsored by Oracle Corporation
WHITE PAPER: This resource explores a backup and restore system that will offer your organization layers of data protection and integrity while providing you the peace of mind to focus on your business and not your data security.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Oracle Corporation

Data Backup and Protection for the Modern Data Center
sponsored by Dell, Inc.
WHITE PAPER: This white paper explains the need for a new set of rules to govern data backup and storage practices. It also focuses on the need to prioritize and protect data while also implementing new technologies where possible.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Dell, Inc.

Best Practices for Backup Using Oracle Storage
sponsored by Oracle Corporation
WEBCAST: This webcast features Oracle experts, Oracle customers and current IOUG members explaining the best practices they've adopted and benefits they've realized using Oracle Exadata with Oracle ZFS Storage Appliances.
Posted: 06 Jun 2014 | Premiered: Jun 6, 2014

Oracle Corporation

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42

A new, innovative, cost-effective and scalable storage solution from HP Converged Systems
sponsored by Red Hat and HP
WHITE PAPER: This white paper explores the benefits of a new, scale out storage solution. It mentions some of the challenges of the modern IT environment such as exponential growth of unstructured data and explains how this solution is capable of handling these challenges.
Posted: 05 Jun 2014 | Published: 30 Sep 2013

Red Hat and HP

Key Considerations for Data Backup and Disaster Recovery
sponsored by CommVault Systems, Inc.
EGUIDE: This e-guide gives tips for planning disaster recovery and backup plans. It also explains the differences between backup, disaster recovery and archiving and lists 10 common mistakes organizations make when planning their disaster recovery strategies.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

CommVault Systems, Inc.

Enterprise File Sync-and-Share Applications
sponsored by Code42
EGUIDE: In this e-guide from the experts at SearchCloudStorage.com, learn the dangers of consumer file sync and share, as well as why security needs vary and other key considerations and features.
Posted: 30 May 2014 | Published: 30 May 2014

Code42

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Better Backup for Big Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains the challenges of modern data backup in the age of Big Data and proposes a new solution that delivers comprehensive database support, protection for data warehouse appliances, Hadoop and Big Data analytics capabilities and more.
Posted: 28 May 2014 | Published: 28 Sep 2012

Symantec Corporation
1 - 25 of 493 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement