IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 449 Matches Previous Page  |  Next Page
Flash-Optimized Data Protection for SSD
sponsored by emc first distribution
DATA SHEET: Discover flash-optimized data protection for SSD that delivers superior array I/O performance and highly-efficient, content-aware decode algorithms for fast rebuild times. Read on to recognize the benefits of adaptive protection build to tolerate multiple, simultaneous SSD failures.
Posted: 27 May 2016 | Published: 27 May 2016

emc first distribution

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Data Protection for All-Flash Storage Arrays
sponsored by emc first distribution
WHITE PAPER: This brief white paper highlights a continuous availability and data mobility platform and an operational disaster recovery solution that protect all-flash arrays. Access now to see how you can integrate these technologies to ensure continuous data protection for your mission-critical workloads and enable any point-in-time recovery.
Posted: 20 May 2016 | Published: 31 Dec 2014

emc first distribution

Data Masking and Subsetting
sponsored by Oracle Corporation
DATA SHEET: Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.
Posted: 19 May 2016 | Published: 30 Oct 2015

Oracle Corporation

Enterprise Class Solid State Storage Performance Evaluation
sponsored by IBM
PRODUCT REVIEW: Evaluate a flash storage solution that combines multiple options for data protection and high-availability, with high performance. Access the test findings of this technology to help your enterprise determine if flash adoption is the next step in boosting your storage infrastructure.
Posted: 19 May 2016 | Published: 29 Feb 2016

IBM

Data Protection in Two Dimensions
sponsored by IBM
WHITE PAPER: Uncover an all-flash storage array that provides two independent dimensions of data protection to help monitor and predict upcoming flash failures. See how you can increase your flash storage efficiency and endurance without sacrificing protection.
Posted: 18 May 2016 | Published: 31 Jan 2016

IBM

Forward Thinking Backup Through Unified Data Protection
sponsored by Veritas
WHITE PAPER: This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.
Posted: 18 May 2016 | Published: 18 May 2016

Veritas

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: With six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

Critical Capabilities for Enterprise Endpoint Backup
sponsored by Druva Software
RESOURCE: Access this in-depth analysis of endpoint backup vendors, highlighting the differences in mobile device support, performance, backup frequency, scalability, security, and more. Ease your enterprise's decision-making process in determining the right endpoint backup service for your data.
Posted: 13 May 2016 | Published: 12 Nov 2015

Druva Software

Modern Snapshot Management: Enhancing Application Protection and Recovery
sponsored by Commvault
WHITE PAPER: This white paper discusses integrating array-based snapshot technologies with an existing data protection approach to improve manageability, recovery, and protection. Discover how you can deliver faster and more granular application-aware data recovery performance with less effort, complexity, and cost.
Posted: 09 May 2016 | Published: 31 Dec 2015

Commvault

Simplifying Enterprise Application and Recovery
sponsored by Commvault
EGUIDE: This e-guide highlights a snapshot management solution that automates snapshot management and application-aware recovery across multiple storage arrays and servers. See how this solution can improve your enterprise's efficiency and enable you to unleash the true potential of snapshots for simplified application recovery.
Posted: 09 May 2016 | Published: 09 May 2016

Commvault

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Top Cloud Storage Considerations for CIOs
sponsored by Commvault
RESOURCE: Discover in this infographic how to increase IT agility and innovation, and create seamless access to your critical data and applications, by way of cloud infrastructure implementation. Access now to learn why cloud is quickly becoming the top storage choice for companies worldwide, and take advantage of cloud-run DR.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Commvault

Drowning in Data Management Complexity? Eliminate IT and Storage Inefficiencies
sponsored by Commvault
WHITE PAPER: Discover in this white paper how to lessen complexity, reduce risk, and effectively harness IT resources in your Big Data and database environments. Read on to achieve strategic gains in productivity and backup with expert advice.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Commvault

Choosing the Right Public Cloud for Better Data Protection
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how to use infrastructure-as-a-service (IaaS) and data protection software to solve the complexity and cost challenges of protecting data. Read on to evaluate public cloud capabilities and data protection software capabilities, so that you can choose the right solution for your enterprise.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Dell Software

Best Practices for Protecting Flash-Based Arrays
sponsored by Dell Software
WHITE PAPER: This white paper covers best practice for protecting flash-based storage arrays and ensuring business processes and operations are agile and responsive. Read on to see how you can successfully transform your backup and recovery software to be more compatible with flash storage.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Dell Software

Infographic: Reach The Strategic Cloud
sponsored by Commvault
RESOURCE: This infographic highlights a smart data management solution with cloud backup and automated in-cloud disaster recovery. Access now and learn how you can bring enterprise controls to your cloud storage and reduce the complexity of your cloud management.
Posted: 27 Apr 2016 | Published: 31 Dec 2014

Commvault

Solution Guide: Optimize VM Backup and Recovery
sponsored by Commvault
RESEARCH CONTENT: This brief resource highlights a VM backup and recovery solution that provides end-to-end VM backup, recovery, and cloud management. Access now to discover the features and benefits that your enterprise can leverage, including server virtualization and cloud-ready data management, integrated archiving and eDiscovery, and more.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Commvault

An Overview of Today's Most Wanted Cloud Storage Features
sponsored by EMC
VIDEO: Tune into this video to watch Diana Gao, Senior Product Marketing Manager at EMC, illustrate the latest storage market trends, address existing challenges that IT managers face with traditional storage and public cloud management, and discover one cloud storage solution that can cater to all of your needs.
Posted: 22 Apr 2016 | Premiered: 24 Mar 2016

EMC

Storage Analyst Discussion: The Shift to Array-Based Snapshots
sponsored by Commvault
VIDEO: In this webcast, Senior Storage Analyst, Dave Simpson, discusses the shift to array-based snapshots that integrate backup software and hardware to create a more efficient, holistic data protection solution. Watch now to see how you can manage all of your arrays under one platform and transform stagnant data into a business resource.
Posted: 20 Apr 2016 | Premiered: 07 Dec 2015

Commvault

Gain Secure Cloud Benefits with On-Premise Object Storage
sponsored by EMC
RESOURCE: This resource discusses how healthcare organizations can reap the benefits of cloud without relinquishing control over data with an on-premise object storage solution. Read on to see how this scalable, object storage platform can efficiently store and secure your unstructured data.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

EMC

Traditional Backup Vs. Modern Data Protection
sponsored by Commvault
WHITE PAPER: From this resource, you will compare traditional backup versus modern data protection, and discover a holistic, single platform approach that will protect your company's vital data. Read on to examine the advantages modern data protection offers over traditional backup.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Commvault

Storage trends 2016: Storage priorities, cloud appliances and NAS vs object storage
sponsored by ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles on storage-related issues from the first few months of 2016.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software
sponsored by Pure Storage
VIDEO: This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled access to their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.
Posted: 15 Apr 2016 | Premiered: 15 Apr 2016

Pure Storage

Case Study: NTT Communicatiosn Delivers Object Storage to Enterprise Cloud Service
sponsored by Cloudian
WHITE PAPER: This case study highlights a telecom company's decision to replace their outdated distributed file storage system with a robust object storage platform designed for hybrid cloud infrastructures. Read on to discover the benefits this solution could provide your enterprise, including reduced acquisition costs, configurable replication, and more.
Posted: 15 Apr 2016 | Published: 31 Dec 2015

Cloudian
1 - 25 of 449 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement