IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 412 Matches Previous Page  |  Next Page
A New Approach to Endpoint Data Protection for Mobile Enterprise
sponsored by Druva Software
WEBCAST: Tune into this webinar to learn about a new approach to endpoint backup that takes cloud infrastructure and mobile enterprise into account.
Posted: 12 Feb 2015 | Premiered: Feb 12, 2015

Druva Software

Tape Fallacies Exposed
sponsored by LTO
WHITE PAPER: Access this white paper to learn about tape backup fallacies and why they're incorrect.
Posted: 03 Feb 2015 | Published: 10 Nov 2009

LTO

Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

Deduplication Makes Data Protection Even Stronger
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: Access this white paper to learn about the next generation of data deduplication.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

A Guide for Solving Backup Complexity and Scale
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: As data requirement increase, organizations move from legacy to dynamic methods of backup, many companies find that creating and effective backup, recovery, and archiving (BURA) solutions involves piecing together multiple products. This white paper details a game changer in terms of backup and recovery.
Posted: 19 Jan 2015 | Published: 31 May 2014

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Why Should You Rethink Your Data Protection Strategy?
sponsored by Dell, Inc.
WHITE PAPER: Backing up data is vital – but what good is backup without effective restoration? This informative white paper details how to redefine your data protection strategy by focusing on recovery.
Posted: 02 Jan 2015 | Published: 31 Dec 2014

Dell, Inc.

Storage anywhere and everywhere: dealing with the challenges of data fragmentation
sponsored by Mimecast
WHITE PAPER: Are we in danger of losing control of business information? This white paper outlines issues associated with information requirements and possible solutions.
Posted: 19 Dec 2014 | Published: 30 Jun 2013

Mimecast

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Why Converged Infrastructure and Data Protection Should Be One Conversation
sponsored by Arrow & HDS
WHITE PAPER: Learn how you can ensure all of the benefits of virtualization by upgrading to a new data protection approach.
Posted: 24 Sep 2014 | Published: 30 May 2014

Arrow & HDS

3 Reasons to Find Backup and Recovery Built for Virtualized Environments
sponsored by VMware
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

VMware

Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by SearchVirtualStorage.com
EBOOK: This Buyer's Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 02 May 2014 | Published: 02 May 2014


Keep Mission Critical Applications Online and Your Data Secure
sponsored by IBM
WHITE PAPER: Are you searching for a way to keep mission-critical apps online and your data secure? This quick infographic offers insight into security challenges that may affect your organization and a tool to help conquer these obstacles.
Posted: 18 Apr 2014 | Published: 30 Nov 2013

IBM

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

Why Data Deduplication Should Matter to You
sponsored by HP and Intel
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HP and Intel

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Better Backup for Big Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains the challenges of modern data backup in the age of Big Data and proposes a new solution that delivers comprehensive database support, protection for data warehouse appliances, Hadoop and Big Data analytics capabilities and more.
Posted: 28 May 2014 | Published: 28 Sep 2012

Symantec Corporation

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 15 May 2014 | Published: 15 May 2014

Dell Software

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps

Introduction to Better Disk Backup for Virtual Machines
sponsored by VMware, Inc.
WHITE PAPER: This white paper gives  an overview of the architecture, deployment, configuration and management of vSphere Data Protection, a backup and recovery solution for VMware, from VMware.
Posted: 25 Apr 2014 | Published: 13 Nov 2013

VMware, Inc.

Case Study - Australia Institute of Management
sponsored by Nimble Storage
WHITE PAPER: This case study highlights the importance of updating IT systems to handle increased storage demands. It also explains how one organization was able to implement a shared storage solution that was designed to work in a virtualized environment.
Posted: 23 Apr 2014 | Published: 30 Apr 2013

Nimble Storage

Enhanced Data Protection for Virtualized Environments
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

VMware, Inc.

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow
1 - 25 of 412 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement