IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 423 Matches Previous Page  |  Next Page
How Snapshots CAN be Backups!
sponsored by Nexenta
WEBCAST: Access this webcast to learn about how snapshots can be used to successfully backup data.
Posted: 08 Apr 2015 | Premiered: Mar 17, 2015

Nexenta

The Power of Self-Encrypting SSD
sponsored by Toshiba
WHITE PAPER: This video examines a self-encrypting SSD offering that addresses the performance drains of CPU software-based encryption in order to greatly improve storage speed and operability.
Posted: 07 Apr 2015 | Published: 01 Feb 2015

Toshiba

How to Address Three Key Challenges When Considering Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about Gartner's recommendations for overcoming the 3 most common endpoint backup hurdles. Read on to learn how to keep company data safe, even on personal devices.
Posted: 01 Apr 2015 | Published: 07 Nov 2014

Druva Software

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Shedding Light on Dark Data
sponsored by Hewlett-Packard Company
WHITE PAPER: "Dark data" occupies a murky area in compliance policy. Ask these four questions to start taming digital debris.
Posted: 26 Mar 2015 | Published: 27 Mar 2015

Hewlett-Packard Company

The Security Benefits of Software-Defined Storage
sponsored by DataCore Software Corporation
WHITE PAPER: Access this white paper to learn what the benefits of SDS are, including how it can help you prevent data loss.
Posted: 05 Mar 2015 | Published: 30 Sep 2014

DataCore Software Corporation

A New Approach to Endpoint Data Protection for Mobile Enterprise
sponsored by Druva Software
WEBCAST: Tune into this webinar to learn about a new approach to endpoint backup that takes cloud infrastructure and mobile enterprise into account.
Posted: 12 Feb 2015 | Premiered: Feb 12, 2015

Druva Software

Tape Fallacies Exposed
sponsored by LTO
WHITE PAPER: Access this white paper to learn about tape backup fallacies and why they're incorrect.
Posted: 03 Feb 2015 | Published: 10 Nov 2009

LTO

Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

Deduplication Makes Data Protection Even Stronger
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: Access this white paper to learn about the next generation of data deduplication.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

A Guide for Solving Backup Complexity and Scale
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: As data requirements increase, organizations move from legacy to dynamic methods of backup, many companies find that creating and effective backup, recovery, and archiving (BURA) solutions involves piecing together multiple products. This white paper details a game changer in terms of backup and recovery.
Posted: 19 Jan 2015 | Published: 31 May 2014

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Why Should You Rethink Your Data Protection Strategy?
sponsored by Dell, Inc.
WHITE PAPER: Backing up data is vital – but what good is backup without effective restoration? This informative white paper details how to redefine your data protection strategy by focusing on recovery.
Posted: 02 Jan 2015 | Published: 31 Dec 2014

Dell, Inc.

Storage anywhere and everywhere: dealing with the challenges of data fragmentation
sponsored by Mimecast
WHITE PAPER: Are we in danger of losing control of business information? This white paper outlines issues associated with information requirements and possible solutions.
Posted: 19 Dec 2014 | Published: 30 Jun 2013

Mimecast

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Hightail for Enterprise: Security Overview
sponsored by Hightail
WHITE PAPER: This white paper outlines how Hightail can keep files secure, even with unsanctioned sharing tools.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

Hightail

The Increasing Value of Data in Australia: Privacy, Security and Compliance
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: Access this video to learn how 150 other organizations are evolving in terms of data management. You'll also learn about new technologies as well as areas where organizations are still frequently exposed to risks.
Posted: 01 Oct 2014 | Premiered: 03 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Examine the Increasing Value of Data
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: In this video, Julian Badell from NTT ICT and Andrew McGee from Hitachi Data Systems have been interviewed by Sky News Business on the responsibilities of data custodianship and how organizations are handling this new currency. View now to learn how new privacy laws are changing the way organizations handle their data.
Posted: 30 Sep 2014 | Premiered: 14 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Data Deduplication: Types and Benefits
sponsored by Dell Software
EGUIDE: In this e-guide, learn from expert Rachel Dines, an analyst with Forrester Research, the differences between software and hardware backup deduplication, post process vs. inline deduplication as well as fixed and variable-block length dedupe.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Dell Software

3 Reasons to Find Backup and Recovery Built for Virtualized Environments
sponsored by VMware
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

VMware

Protect Endpoint Data without Sacrificing End User Experience
sponsored by Code42
WHITE PAPER: Check out this white paper to learn your options for delivering better backup and security for the data stored on your workforce's devices. You'll also learn how you can deliver an architecture that scales with market/client demand and empowers you with business-grade tools – without sacrificing the experience of the end user.
Posted: 07 Jul 2014 | Published: 30 May 2014

Code42

Top Five Benefits of Image-Based Backup
sponsored by Datto, Inc.
WHITE PAPER: This white paper explains the benefits of image-based backup over traditional methods. Image-based backup provides faster and more reliable data recovery and protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Datto, Inc.

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

Why Data Deduplication Should Matter to You
sponsored by HP and Intel
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HP and Intel

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
1 - 25 of 423 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement