IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 455 Matches Previous Page  |  Next Page
Enterprise-Class Resiliency and Availability with Flash
sponsored by IBM
VIDEO: Andy Walls, CTO at IBM, provides an in-depth look at highly available flash storage solutions that can consolidate all of your workloads in one place. Discover the benefits your enterprise can achieve with these flash systems, including consistent performance, protection against any type of failure, and more.
Posted: 17 Aug 2016 | Premiered: 27 Apr 2016

IBM

Future-Proofing Public Safety Storage
sponsored by Red Hat
BROCHURE: Using body cameras as a chief example, this resource explores ways to bring choice, flexibility, and security to storage investments. Access now to learn more about on-premise vs. cloud considerations and how to secure your data.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Red Hat

Storage Health Check
sponsored by Red Hat
RESOURCE: This resource explores the use of a storage health check to help you get the most out of your storage investment. Find out how to conduct a comprehensive analysis of your storage instance, optimize performance, and implement best practices by evaluating 7 key areas.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Red Hat

"Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs
sponsored by NTT ICT
VIDEO: If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.
Posted: 05 Aug 2016 | Premiered: 30 May 2016

NTT ICT

Converged Data Protection for Continuously Available Applications
sponsored by NTT ICT
WHITE PAPER: Learn how to combine the availability of instant local and remote array-based snapshots with cost efficient disk-based backup, in order to provide multiple recovery points and rapid data restore times. Read on to examine a centralized recovery manager that maintains constant app availability.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection
sponsored by NTT ICT
WHITE PAPER: This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Application-managed Data Protection for HPE 3PAR StoreServ Storage
sponsored by NTT ICT
WHITE PAPER: In this white paper, examine the benefits of combining backups and snapshots in application-managed, storage-integrated, end-to-end data protection. Read on to simplify your evolving data environment, bolster backup windows and recovery time, and access multi-streaming support.
Posted: 03 Aug 2016 | Published: 03 Aug 2016

NTT ICT

Extend Your Storage Options without Compromising on Security, Reliability
sponsored by BT
WHITE PAPER: Cloud-based object storage ensures data delivery, provides enhanced security and durability that cloud storage solutions typically do not offer. Discover the benefits your enterprise can reap with this storage solution, including easy data migration, automated data replication, and more.
Posted: 29 Jul 2016 | Published: 31 Dec 2014

BT

Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Signiant, Inc.

How to Protect Your Data in a Converged Infrastructure Environment
sponsored by Hewlett Packard Enterprise
RESOURCE: Download this infographic to improve capacity utilization for the new influx of mobile, cloud, and big data with a converged storage environment. Learn why you should consider a converged storage environment to optimize your data protection and enable seamless data movement between devices.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Hewlett Packard Enterprise

The Business Value of Data Deduplication
sponsored by Richardson Eyres
WHITE PAPER: Discover a data deduplication system that can dramatically improve backup, recovery, and archiving processes. Explore the benefits your enterprise can achieve with one data deduplication system, including reduced backup costs, simplified backup and recovery operations, increased flexibility, and more.
Posted: 29 Jun 2016 | Published: 30 Sep 2015

Richardson Eyres

Flash Revelations From 1,000 Storage Users: Workload Performance and Adoption Sentiment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how 1,000 expert storage users responded to the question, "What surprises have you experienced since you started deploying flash storage in your organization?" and assess how well flash pairs with VDI, big data, Microsoft SQL Server, and more.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

Hewlett Packard Enterprise

Top Reasons Why Customers Deploy Hybrid Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 21 Jun 2016 | Published: 30 Apr 2016

TechData - EMC

Top Reasons Why Customers Deploy Flash Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.
Posted: 17 Jun 2016 | Published: 30 Apr 2016

TechData - EMC

Best Practices in VDI Implementation in Healthcare Environments
sponsored by Pure Storage
WHITE PAPER: While VDI appears ideal for the healthcare industry, its expensive cost and impact on current security leave many reluctant to adopt it. Find out how VDI could benefit you in the long term by saving your organization time and money.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Pure Storage

The Benefits of a More Efficient Hyperconverged Architecture
sponsored by Pivot3
WHITE PAPER: Discover in this resource a comparison of HCI appliances purpose-built for storage-centric business workload environments, based on criteria including VDI density, storage efficiency, and cost savings.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Pivot3

Complete Your Converged IT Strategy
sponsored by Veeam Software
DATA SHEET: In this data sheet, you will discover how to complete your IT convergence strategy with appropriate backup software. Read on to learn how the right backup deployment can unlock comprehensive, fast, and resilient data protection for your converged environment and fully support an always-on business model.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Veeam Software

Configuration Guide for Veeam Backup & Replication
sponsored by Veeam Software
ESSENTIAL GUIDE: Successfully protect your virtual and physical storage and network infrastructure with this step-by-step configuration guide for installing a data backup and replication solution.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

Veeam Software

Storage Efficiencies with Hyper-V at the Virtual and Physical Layer
sponsored by Veeam Software
WHITE PAPER: Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.
Posted: 24 May 2016 | Published: 24 May 2016

Veeam Software

Data Protection in Two Dimensions
sponsored by IBM
WHITE PAPER: Uncover an all-flash storage array that provides two independent dimensions of data protection to help monitor and predict upcoming flash failures. See how you can increase your flash storage efficiency and endurance without sacrificing protection.
Posted: 18 May 2016 | Published: 31 Jan 2016

IBM

Forward Thinking Backup Through Unified Data Protection
sponsored by Veritas
WHITE PAPER: This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.
Posted: 18 May 2016 | Published: 18 May 2016

Veritas

Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: A Windows OS migration can be a headache for IT managers and teams, but it is possible to reduce your stress – and your company's risk – by leveraging endpoint data protection. Follow these six steps to craft a Windows 10 OS migration plan that provides data protection and governance for your enterprise.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

What you need to know about enterprise endpoint backup
sponsored by Druva Software
RESOURCE: Access this in-depth analysis of endpoint backup vendors, highlighting the differences in mobile device support, performance, backup frequency, scalability, security, and more. Ease your enterprise's decision-making process in determining the right endpoint backup service for your data.
Posted: 13 May 2016 | Published: 12 Nov 2015

Druva Software

Modern Snapshot Management: Enhancing Application Protection and Recovery
sponsored by Commvault
WHITE PAPER: Integrating array-based snapshot technologies with an existing data protection approach can greatly improve data manageability, recovery, and protection. Discover how you can deliver faster and more granular application-aware data recovery performance with less effort, complexity, and cost.
Posted: 09 May 2016 | Published: 31 Dec 2015

Commvault

Simplifying Enterprise Application and Recovery
sponsored by Commvault
EGUIDE: This e-guide highlights a snapshot management solution that automates snapshot management and application-aware recovery across multiple storage arrays and servers. See how this solution can improve your enterprise's efficiency and enable you to unleash the true potential of snapshots for simplified application recovery.
Posted: 09 May 2016 | Published: 09 May 2016

Commvault
1 - 25 of 455 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement