IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 438 Matches Previous Page  |  Next Page
Data Backup Types Explained: Full, Incremental, Differential and Incremental- Forever Backup
sponsored by Datalink
EGUIDE: This expert guide reviews full, incremental and differential data backup software and discusses the newer types of backups that have emerged in the market, such as synthetic and incremental-forever backups. Access now to learn how to choose the right data backup system is for your enterprise's data.
Posted: 01 Dec 2015 | Published: 01 Dec 2015


Case Study: Video Surveillance Firm Drives International Growth with OEM Partnership
sponsored by Dell, Inc.
CASE STUDY: This case study showcases one video surveillance company's partnership with an OEM solution that provided secure, customizable IT hardware. Read on to see how this OEM solution can provide you with high-performance hardware that can allow you to offer reliable service to your customers and continue to expand your business.
Posted: 19 Nov 2015 | Published: 30 Jun 2015

Dell, Inc.

Secure Cloud Application Usage: Protect the Business Against Cloud-Based Threats
sponsored by IBM
WHITE PAPER: This essential solution brief highlights a SaaS solution that integrates cloud discovery, threat intelligence and prevention, policy enforcement, identity as a service, and more into one solution. Access now to see how this solution can simplify and secure your cloud application use as well as help protect against user and cloud-based threats.
Posted: 10 Nov 2015 | Published: 30 Sep 2015


Promote True Data Agility Using All-Flash Arrays: What You Need to Know
sponsored by Data#3
WHITE PAPER: In this white paper, you will discover why all-flash arrays deliver improved business benefits and lower operating expenses, particularly in performance-intensive applications such as big data, VDI, OLTP, and hybrid cloud computing.
Posted: 10 Nov 2015 | Published: 30 Jun 2015


2015 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
ANALYST REPORT: This exclusive report quantifies the economic impact of data breaches in 2015 by observing cost trends over time and analyzes the impact of business continuity management programs. Access now to see how implementing a business continuity management program can positively impact the financial and reputational consequences of a data breach.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


How to Enable an Analytics-Driven Approach to Backup and Recovery
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper discusses an analytics-driven solution that supports mission-critical data backup. Read on to see how this approach can address the dynamic nature of today's data center, handle the diversity of data that must be protected, and provide a far greater level of business resiliency than yesterday's backup and recovery solution.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

Hewlett-Packard Enterprise

Data Protection for Virtual Environments: Extending Solutions to VMware and Hyper-V Environments
sponsored by IBM
WHITE PAPER: This white paper highlights a data protection solution for virtual environments that can adjust backups to support larger and more critical workloads. Read on to learn how this solution can make it easier for your enterprise to manage and monitor a complete data protection environment, both physical and virtual.
Posted: 03 Nov 2015 | Published: 03 Nov 2015


IBM vs. EMC Data Protection Platforms: A Competitive Test and Evaluation Report
sponsored by TCM/IBM
WHITE PAPER: This white paper evaluates two commercially available storage solutions, EMC vs. IBM, in a backup and retrieval scenario and focuses on the throughput and scalability they both bring to the table. Read on to see what solution can provide you with the right data protection for your enterprise and can fulfill your performance and scalability needs.
Posted: 02 Nov 2015 | Published: 02 Nov 2015


A Solution to Storage Encryption Inefficiencies
sponsored by IBM
WHITE PAPER: This white paper introduces an innovative way to cut down on those inefficiencies and costs with a single encryption solution that protects your entire storage environment.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


Deep Storage Solution Leverages Tape, NAS, and Cloud for Cost-Effective DRaaS
sponsored by FujiFilm Dternity
WHITE PAPER: This white paper discusses the benefits of a hybrid disaster recovery approach while also implementing DRaaS for data protection and recovery. Read more to see how this can offer your enterprise an easy-to-use, cost-effective approach to your data protection systems that will help improve your business continuity both on-premise and in the cloud.
Posted: 27 Oct 2015 | Published: 31 Aug 2015

FujiFilm Dternity

Is Your High-Value Data Safe?
sponsored by Imation Corp.
WHITE PAPER: This resource discusses how you can keep your most valuable data out of hackers' hands with a range of advanced technologies, including encryption and stronger authentication.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Imation Corp.

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Four Essential Fundamentals to Increasing Agility in the Cloud
sponsored by Commvault
WHITE PAPER: Access this white paper to learn about the 4 key elements that should be implemented to help your enterprise efficiently manage data protection and recovery operations. Read on to see how you can achieve a single point of control for both your on-premise and cloud-based data and improve your overall data protection.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Ensure Business Continuity with a Modern Disaster Recovery Approach
sponsored by Commvault
WHITE PAPER: This essential white paper discusses the need for a modern, cloud approach to disaster recovery that consists of multiple facets united on a common platform. Read on to learn how cloud can help your enterprise unify, centralize and simplify your DR operations.
Posted: 29 Sep 2015 | Published: 29 Sep 2015


8 Storage Tips and Tricks from Pure Storage
sponsored by Pure Storage
WHITE PAPER: This brief white paper highlights 8 tips and tricks for implementing one particular flash storage platform. Access this paper now to key into expert advice for selecting enterprise storage vendors, as well as learn why legacy storage recommendations no longer hold true for flash, and more.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Case Study: Blast Performance with Flash
sponsored by Pure Storage
WHITE PAPER: This case study showcases a company's adoption of flash storage to free up data center space previously occupied by several legacy disk arrays. Read on to find out how to improve the speed and reliability of your organization with this storage solution, as well as scale customer analytics.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015


Erasure Coding 101: Implementing Flexible Business Continuity
sponsored by Pivot3
WEBCAST: In this webinar, Bob Haas, Sales Engineer at Pivot3, discusses erasure coding within the context of HCI, and how HCI erasure coding can be applied to disaster recovery in your organization. Access this video now to optimize your business continuity strategies with HCI.
Posted: 11 Sep 2015 | Premiered: Sep 11, 2015


PlentyOfFish and SanDisk: A Perfect Match for Engineering Love
sponsored by SanDisk Corporation
WHITE PAPER: This case study outlines how the world's largest online dating site, PlentyOfFish was able to overcome its storage challenges by transitioning to an all-flash environment. Access this resource to master the cost containment and data performance problems in your organization.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SanDisk Corporation

Webcast: Global Hyper-Convergence 101: An Industry-Leading Advantage
sponsored by Pivot3
WEBCAST: In this webinar, Bob Haas, Sales Engineering Team Lead at Pivot3, highlights one hyper-converged infrastructure (HCI) software solution that will ensure fault tolerance without replicating data. Access this video now to get an insider look at how to differentiate HCI provider offerings based on industry.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


Webcast: Simplifying the Data Center with Hyper-Convergence
sponsored by Pivot3
WEBCAST: In this webcast, Bob O'Donnell, Founder and Chief Analyst at Technalysis Research, explains why hyper-convergence is now having a major impact on data centers and IT. Access this video to learn how hyper-converged infrastructures (HCI) are simplifying IT organization and the delivery of services.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


Webcast: How Innovations in IT are Revolutionizing Physical Security
sponsored by Pivot3
WEBCAST: This webcast discusses these leading-edge IT technologies with regards to the unique needs of video surveillance and physical security
Posted: 09 Sep 2015 | Premiered: Sep 9, 2015


Examining the Top Competitors of Converged Infrastructure Services
sponsored by Pivot3
WHITE PAPER: In this guide, you will learn why organizations are looking to adopt and implement converged infrastructure environments, as well as get an overview of the converged infrastructure providers, including a 10-point vendor comparison.
Posted: 08 Sep 2015 | Published: 31 Dec 2014


The Validated Design Guide for Enterprise Desktop Solutions
sponsored by Pivot3
WHITE PAPER: This white paper serves as a guide for a high-grade enterprise desktop solution. The guide is intended to provide guidance for the introduction of proof of concepts, emerging new technology and architectures, as well as enhancement of customer use cases.
Posted: 08 Sep 2015 | Published: 08 Sep 2015


SEA-TAC Airport Enterprise Storage Strategy Fosters Sustainability
sponsored by Pivot3
WHITE PAPER: This case study demonstrates how the Seattle-Tacoma International Airport developed a plan to deploy a centralized security management system. Read on here to deliver enterprise-class video surveillance IT infrastructure in a simple-to-deploy and scale-out appliance model.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

1 - 25 of 438 Matches Previous Page    1 2 3 4    Next Page
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement