IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 412 Matches Previous Page  |  Next Page
Data-Aware Storage: Introducing a New Era of Data Management
sponsored by DataGravity
RESOURCE CENTER: This white paper shows you a new way to store data: data-aware storage. This storage architecture combines state-of-the-art primary storage with integrated data services to create an entirely new method of storage.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

DataGravity

Case Study: Calypso Drinks Enhances Disaster Recovery Provision
sponsored by Icomm Technologies
CASE STUDY: This case study uncovers how one company was able to enhance their disaster recovery provision and overall storage with a server virtualization solution. Discover how you can bring your overall disaster recovery costs down and fulfill your storage requirements by virtualizing your existing physical servers.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

Icomm Technologies

Backup for Dummies
sponsored by Acronis
EBOOK: This e-book provides a comprehensive guide for putting data protection and disaster recovery systems in place for use cases ranging from simple file recovery to the most complex systems. Read on to learn how to manage your enterprise's data with ten tips for easier backup and recovery.
Posted: 21 Jan 2016 | Published: 31 Dec 2014

Acronis

Time for IT to Reign in Cloud Computing Control
sponsored by Microsoft
EGUIDE: Access this e-guide to see how hybrid cloud models can enable organizations to promote secure and economical storage without eliminating the freedom that users prefer. You will also learn how niche cloud computing environments are providing more targeted services and how to build a solid hybrid cloud environment.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Microsoft

An Expert Guide to Data Archiving with the Hybrid Cloud
sponsored by Microsoft
RESOURCE: In this resource, you will discuss the newest technologies used for digital archiving, and discover how the Microsoft hybrid cloud solution (HCS) can be used to archive data to Windows Azure Storage. Access this resource chapter to utilize cloud replication services that provide DR protection.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

Microsoft

Ten Smart Things to Know About Storage
sponsored by Icomm Technologies
WHITE PAPER: This white paper uncovers how the field of storage is developing and how new storage innovations such as cloud and virtualization can affect your business. Read on to learn how one vendor can provide your enterprise with a unified storage solution with the capabilities to manage some of the not so glamorous storage trends in today's environment.
Posted: 05 Jan 2016 | Published: 31 Dec 2012

Icomm Technologies

Your Business May Be at Risk: How Well is Your Data Protected
sponsored by Datto, Inc.
EBOOK: This e-book discusses data protection challenges and solutions in the emerging data-dependent business area, identifying the essentials for a successful data protection solution. Access now to learn how "Total Data Protection" solutions can efficiently protect your big data and ensure fast and easy data recovery in the event of a disaster.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Hybrid Disaster Recovery Solutions: Maintain Business as Usual Under Any Condition
sponsored by Carbonite
WHITE PAPER: This brief white paper overviews a disaster recovery solution engineered for the needs of SMBs. Read on to learn how this hybrid backup solution can improve your data protection and provide your enterprise with rapid recovery, flexibility, scalability, and more.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Carbonite

The Race for Space: Flash Storage Evolves
sponsored by Kaminario
WHITE PAPER: This white paper discusses how new designs of all flash arrays can finally deliver the promise of Flash memory if the technology is applied correctly. View now to learn what key characteristics your flash storage solution should deliver.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Kaminario

Backup and Disaster Recovery: The IT Experience
sponsored by Carbonite
EBOOK: This eBook explores the impact of downtime and data loss on IT departments and offers a backup solution that can help meet your disaster recovery needs. Access now to see how this backup solution can provide your enterprise with better protection and faster recovery for all your business data.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

Carbonite

Secure Cloud Application Usage: Protect the Business Against Cloud-Based Threats
sponsored by IBM
WHITE PAPER: This essential solution brief highlights a SaaS solution that integrates cloud discovery, threat intelligence and prevention, policy enforcement, identity as a service, and more into one solution. Access now to see how this solution can simplify and secure your cloud application use as well as help protect against user and cloud-based threats.
Posted: 10 Nov 2015 | Published: 30 Sep 2015

IBM

How to Enable an Analytics-Driven Approach to Backup and Recovery
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper discusses an analytics-driven solution that supports mission-critical data backup. Read on to see how this approach can address the dynamic nature of today's data center, handle the diversity of data that must be protected, and provide a far greater level of business resiliency than yesterday's backup and recovery solution.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

Hewlett-Packard Enterprise

8 Storage Tips and Tricks from Pure Storage
sponsored by Pure Storage
WHITE PAPER: This brief white paper highlights 8 tips and tricks for implementing one particular flash storage platform. Access this paper now to key into expert advice for selecting enterprise storage vendors, as well as learn why legacy storage recommendations no longer hold true for flash, and more.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015

IBM

Storage Magazine, August 2015
sponsored by SearchStorage.com
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchStorage.com

Enterprise File Sharing Without Giving Up Control of IT Functions
sponsored by Red Hat
WHITE PAPER: Read this white paper and discover how the Red Hat Gluster Storage solution enhances workforce productivity without handing over control of IT functions to public cloud service providers.
Posted: 29 Jun 2015 | Published: 27 Feb 2015

Red Hat

Growing Data, Growing Danger: How To Reduce Breaches
sponsored by Micron Technology
RESOURCE: This helpful resource details how to protect data from potential breaches using SSD. Read on to get the facts about data security, and why all companies must put data protection at the top of their priorities.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Micron Technology

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Storage Anywhere and Everywhere: Dealing With the Challenges of Data Fragmentation
sponsored by Mimecast
WHITE PAPER: This white paper provides key findings from a research study on how organizations are meeting information-related requirements and overcoming data fragmentation and cloud storage challenges. Read on to learn how you can efficiently manage your business information with a cloud-based storage solution.
Posted: 19 Dec 2014 | Published: 30 Jun 2013

Mimecast

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper explains encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

Why Data Deduplication Should Matter to You
sponsored by HPE and Intel®
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HPE and Intel®

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42
1 - 25 of 412 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement