IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 454 Matches Previous Page  |  Next Page
Accelerated i/O for Cloud Storage
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Signiant, Inc.

How to Protect Your Data in a Converged Infrastructure Environment
sponsored by Hewlett Packard Enterprise
RESOURCE: Download this infographic to improve capacity utilization for the new influx of mobile, cloud, and big data with a converged storage environment. Learn why you should consider a converged storage environment to optimize your data protection and enable seamless data movement between devices.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Hewlett Packard Enterprise

The Business Value of Data Deduplication
sponsored by Richardson Eyres
WHITE PAPER: Discover a data deduplication system that can dramatically improve backup, recovery, and archiving processes. Explore the benefits your enterprise can achieve with one data deduplication system, including reduced backup costs, simplified backup and recovery operations, increased flexibility, and more.
Posted: 29 Jun 2016 | Published: 30 Sep 2015

Richardson Eyres

Flash Revelations From 1,000 Storage Users: Workload Performance and Adoption Sentiment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how 1,000 expert storage users responded to the question, "What surprises have you experienced since you started deploying flash storage in your organization?" and assess how well flash pairs with VDI, big data, Microsoft SQL Server, and more.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

Hewlett Packard Enterprise

Case Study: Virtualization Strengthening Security
sponsored by emc first distribution
CASE STUDY: Learn how a government agency with very particular needs boosted performance for its systems that were struggling to secure a growing volume of important data on physical workstations.
Posted: 24 Jun 2016 | Published: 30 Sep 2015

emc first distribution

CERN deploys IBM data protection software to safeguard petabytes of critical data
sponsored by IBM
CASE STUDY: The IT department at CERN, known for the Large Hadron Collider, manages a massive data archive of 100 petabytes of data. Read on to learn about the data storage and backup functionality that meets CERN's big-data protection requirements.
Posted: 20 Jun 2016 | Published: 31 Mar 2016

IBM

Cost Savings And Business Benefits Enabled By Cleversafe Object Storage
sponsored by IBM
ANALYST REPORT: In this exclusive report, learn how to reduce the cost of storing massive data sets required for the collection and analysis of big data with object storage. Access now to understand the benefits, costs, and risks associated with object storage so you can effectively leverage this service for high-performance computing environments.
Posted: 14 Jun 2016 | Published: 31 Mar 2015

IBM

Best Practices in VDI Implementation in Healthcare Environments
sponsored by Pure Storage
WHITE PAPER: While VDI appears ideal for the healthcare industry, its expensive cost and impact on current security leave many reluctant to adopt it. Find out how VDI could benefit you in the long term by saving your organization time and money.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Pure Storage

The Benefits of a More Efficient Hyperconverged Architecture
sponsored by Pivot3
WHITE PAPER: Discover in this resource a comparison of HCI appliances purpose-built for storage-centric business workload environments, based on criteria including VDI density, storage efficiency, and cost savings.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Pivot3

7 Key Capabilities to Consider for Object Storage
sponsored by IBM
ANALYST REPORT: Storage analysts compare leading object storage products in 7 key areas, including capacity, storage efficiency, interoperability, manageability and 3 more. Discover how each product scored in these categories and access recommendations on how to select the right object storage solution for your enterprise.
Posted: 06 Jun 2016 | Published: 31 Mar 2016

IBM

Resiliency and Data Protection with Riverbed SteelFusion
sponsored by Riverbed Technology, Inc.
RESOURCE: Enterprise Strategy Group (ESG) graphically summarizes the hands-on lab review, Zero Branch IT with Riverbed SteelFusion. Access this at-a-glance view now, complete with live links to download the complete report and learn more details about SteelFusion.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Riverbed Technology, Inc.

Complete Your Converged IT Strategy
sponsored by Veeam Software
DATA SHEET: In this data sheet, you will discover how to complete your IT convergence strategy with appropriate backup software. Read on to learn how the right backup deployment can unlock comprehensive, fast, and resilient data protection for your converged environment and fully support an always-on business model.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Veeam Software

Configuration Guide for Veeam Backup & Replication
sponsored by Veeam Software
ESSENTIAL GUIDE: Successfully protect your virtual and physical storage and network infrastructure with this step-by-step configuration guide for installing a data backup and replication solution.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

Veeam Software

Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER: Flash storage not only provides the performance necessary to run next-generation applications – such as cloud, mobile and social systems, and data analytics – but also provides the security necessary to prevent data breaches. See how your enterprise can boost your competitive advantage by leveraging flash today.
Posted: 01 Jun 2016 | Published: 31 Jan 2015

IBM

Top Reasons Why Customers Deploy Flash Storage
sponsored by EMC
WHITE PAPER: Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.
Posted: 31 May 2016 | Published: 30 Apr 2016

EMC

Flash-Optimized Data Protection
sponsored by emc first distribution
DATA SHEET: Discover a flash-optimized data protection solution that delivers superior array I/O performance and highly-efficient, content-aware decode algorithms for fast rebuild times. Read on to recognize the benefits of adaptive protection build to tolerate multiple, simultaneous SSD failures.
Posted: 27 May 2016 | Published: 27 May 2016

emc first distribution

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Data Protection for All-Flash Storage Arrays
sponsored by emc first distribution
WHITE PAPER: This brief white paper highlights a continuous availability and data mobility platform and an operational disaster recovery solution that protect all-flash arrays. Access now to see how you can integrate these technologies to ensure continuous data protection for your mission-critical workloads and enable any point-in-time recovery.
Posted: 20 May 2016 | Published: 31 Dec 2014

emc first distribution

Forward Thinking Backup Through Unified Data Protection
sponsored by Veritas
WHITE PAPER: This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.
Posted: 18 May 2016 | Published: 18 May 2016

Veritas

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: In just six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

Critical Capabilities for Enterprise Endpoint Backup
sponsored by Druva Software
RESOURCE: Access this in-depth analysis of endpoint backup vendors, highlighting the differences in mobile device support, performance, backup frequency, scalability, security, and more. Ease your enterprise's decision-making process in determining the right endpoint backup service for your data.
Posted: 13 May 2016 | Published: 12 Nov 2015

Druva Software

Modern Snapshot Management: Enhancing Application Protection and Recovery
sponsored by Commvault
WHITE PAPER: This white paper discusses integrating array-based snapshot technologies with an existing data protection approach to improve manageability, recovery, and protection. Discover how you can deliver faster and more granular application-aware data recovery performance with less effort, complexity, and cost.
Posted: 09 May 2016 | Published: 31 Dec 2015

Commvault

Simplifying Enterprise Application and Recovery
sponsored by Commvault
EGUIDE: This e-guide highlights a snapshot management solution that automates snapshot management and application-aware recovery across multiple storage arrays and servers. See how this solution can improve your enterprise's efficiency and enable you to unleash the true potential of snapshots for simplified application recovery.
Posted: 09 May 2016 | Published: 09 May 2016

Commvault

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Top Cloud Storage Considerations for CIOs
sponsored by Commvault
RESOURCE: In this infographic, discover how to increase IT agility and innovation, and create seamless access to your critical data and applications, by way of cloud infrastructure implementation. Access now to learn why cloud is quickly becoming the top storage choice for companies worldwide, and take advantage of cloud-run DR.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Commvault
1 - 25 of 454 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement