IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 479 Matches Previous Page  |  Next Page
Gordon College Case Study
sponsored by Reduxio
CASE STUDY: In this case study learn why Gordon College adopted Reduxio's HX550 hybrid flash array to accomplish their goals of app consolidation, reduced database latency, and more.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

Reduxio

A Complete Data Protection Suite
sponsored by Carbonite
WHITE PAPER: Inside, read about a suite of software that provides high availability coupled with non-disruptive migrations to the cloud, and active backup.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Carbonite

Create More than 55x Faster Hybrid Cloud Solutions with Maximum Security, Availability and Elasticity
sponsored by Digital Realty
WHITE PAPER: Download this white paper to discover technology designed to deliver maximum storage and compute capacity for enterprises, with massive data stores, that need to solve business problems fast without compromising the security of user information.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Digital Realty

Affordable, Secure and Compliant Data Storage for Law Enforcement Agencies
sponsored by Wasabi
WHITE PAPER: Read this white paper to learn why many departments are adopting object-based public cloud storage to give them the capacity and security they so desperately need in today's virtual environments that require data durability, encryption, and more.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Wasabi

Data Immutability Provides Ultimate Protection
sponsored by Wasabi
WHITE PAPER: This white paper explores a universal cloud object storage service that protects against accidental or malicious data destruction, so you can avoid data erasure, combat ransomware and viruses, and more.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Wasabi

File Sharing Service Eases IT Migration to Windows 10
sponsored by Citrix
WHITE PAPER: Download this white paper to discover a file sharing, storage and sync service that will support your mobile workforce's secure data storage and sharing needs for Windows 10 and beyond in terms of security, flexibility, productivity and Office 365 integration.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Citrix

Building the Best Backup Plan for Today's Storage Environment
sponsored by Iron Mountain
EGUIDE: In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.
Posted: 27 Sep 2017 | Published: 21 Sep 2017

Iron Mountain

Why Enterprises Are Embracing Hyper-Converged Infrastructure
sponsored by VMware & Intel
WHITE PAPER: Download this interactive resource to discover a virtual SAN-powered hyper-converged infrastructure (HCI) that will ameliorate inflexible legacy infrastructure issues with 10x increase in usable capacity, enterprise-class availability with support for stretched clusters, and more.
Posted: 25 Sep 2017 | Published: 31 Jan 2017

VMware & Intel

10 Simple Tips to Protect Yourself from Ransomware
sponsored by Acronis
WHITE PAPER: Inside, learn 10 tips as to how you can optimize your backup system to help defend against the ransomware threat
Posted: 12 Sep 2017 | Published: 12 Sep 2017

Acronis

Transforming Data Protection with Blockchain Tech, Ransomware Protection, and Quick Insights
sponsored by Acronis
WHITE PAPER: Today's infrastructure needs a holistic data protection suite compatible with all workloads in all environments. This IDC report outlines one such offering, which provides a blockchain-based authentication and integrity tool for automated, proactive protection from ransomware, and more.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Acronis

How to Secure Your Microsoft Office 365 Environment
sponsored by AWS-Netapp
WHITE PAPER: Is your Office 365 environment leaving you exposed to accidental deletion, corruption, or theft of your data? Discover how you can safeguard your environment with Cloud Control, a comprehensive data protection solution that uses AWS cloud as your backup storage target.
Posted: 29 Aug 2017 | Published: 22 Aug 2017

AWS-Netapp

Ransomware Recovery Cases: Rebounding After an Attack and the Value of Data Backups
sponsored by Commvault
EGUIDE: In this expert guide, learn how to verify the integrity of your backups in order to thwart, and recover from, potential ransomware attacks. Inside, our writers provide 4 case studies of organizations that were hit then executed a successful ransomware recovery, as well as vendors fighting on the front line of the outbreak.
Posted: 23 Aug 2017 | Published: 22 Aug 2017

Commvault

Reimagining Legacy Information Management and Protection
sponsored by StorageCraft Technology Corporation
WEBCAST: Inside, explore a scale-out NAS system with a unique scale-out architecture that can seamlessly integrate with your existing virtual environments. Learn how you can add up to 96 TBs of raw capacity in minutes, gain continuous data protection, and more.
Posted: 22 Aug 2017 | Premiered: Jun 30, 2017

StorageCraft Technology Corporation

Scale-out Storage Single Platform for Primary and Secondary Storage
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Learn how you can simplify storage management inside. By reading on, you'll discover how the partnership between a scale-out storage server and a distributed object-based file system can provide you with universal data access for both hot and cold storage.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

StorageCraft Technology Corporation

Storage Snapshots: An Overview on the State of Data Recovery
sponsored by Reduxio
RESOURCE: This post serves as your condensed resource on snapshots, providing an overview on snapshots' history, innovation, and use cases, as well as snapshot usage limitations. Read on to also gain a strategy for surmounting the shortcomings of snapshots, using a technique called BackDating.
Posted: 14 Aug 2017 | Published: 04 May 2016

Reduxio

SaaS-based Billing Provider with Encryption Requirements Turns to Flash
sponsored by Kaminario
CASE STUDY: Download this study to see a snapshot view of how one organization overcame their encryption and capacity conundrums by implementing an all-flash array for their production databases, executing a 10X performance improvement, with built-in encryption to handle data-at-rest requirements.
Posted: 10 Aug 2017 | Published: 31 Aug 2016

Kaminario

New Flash Use Cases Identified and What to Do about the NAND Flash Shortage
sponsored by Kaminario
EGUIDE: Because we're in the midst of a worldwide NAND flash shortage, will once-lowered costs now rise? Download this guide as our editors evaluate the impact the NAND flash shortage has on the cost of SSDs (and how that compares per gigabyte to HDDs), as well as new use cases like flash as RAM.
Posted: 09 Aug 2017 | Published: 03 Aug 2017

Kaminario

SaaS Express: Immediate Response for K2 Powered Loyalty Programs
sponsored by Kaminario
CASE STUDY: Read this study to gain a condensed view of how Exchange Solutions cut overall response times by half and storage platform response times by 80% with Kaminario K2 all-flash-arrays, with integrated data-at-rest encryption, deduplication, and compression to meet their stringent security and PCI requirements.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Kaminario

SearchStorage Editors Examine the Leading All-flash Array Vendors
sponsored by Pure Storage
EGUIDE: In this e-guide, we evaluate eight leading AFA vendors to let you decide which products best suit your organization. Read on as Logan Harbaugh, IT consultant and freelance reviewer with SearchStorage, breaks down how to select an AFA vendor based on functional specification, 3 essential purchasing considerations, and more.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

Pure Storage

Analyst Report: Evaluating the 2017 Solid-State Array Market
sponsored by Pure Storage
ANALYST REPORT: Download this report to simplify your vendor evaluation of the 2017 solid state array (SSA) market, wherein analysts do all the heavy-lifting and break down each SSA vendor's market positioning. You'll view the market as a whole, as well as the strengths and drawbacks of 11 SSA providers, here.
Posted: 20 Jul 2017 | Published: 13 Jul 2017

Pure Storage

The Business Value of Storage Simplicity
sponsored by Pure Storage
RESEARCH CONTENT: Download this 451 Research paper to discover how all-flash array implementation proactively eliminated time-consuming array tuning, disruptive hardware upgrades, and slow provisioning, and how survey respondents are using AFAs to reduce this disruption. You'll also learn the top 5 benefits yielded from SSD implementation.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

Pure Storage

Critical Capabilities for Solid-State Arrays: An Industry Analyst Perspective
sponsored by Pure Storage
ANALYST REPORT: Solid state arrays are more affordable than you think: In this report, Gartner analyzes 11 SSAs across six high-impact use cases. Read on to choose an SSA that provides the performance, RAS, multitenancy and security, and scalability you need without breaking IT's budget.
Posted: 11 Jul 2017 | Published: 31 Aug 2016

Pure Storage

SSDs: Fast Storage Made Simple—and Economical
sponsored by EOH IBM
RESOURCE: Download this infographic to get a snapshot view of all-flash storage arrays that deliver simply consistent performance, more than 5x data reduction with inline pattern removal, data-at-rest encryption across all managed data sets, and more. Here's your chance to mitigate your storage architecture complexities.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

EOH IBM

Differentiating All-flash Array Vendors from their Counterparts
sponsored by Tegile, a Western Digital brand
EGUIDE: Our experts compiled this guide to determining the most suitable AFA vendor for your enterprise—ensuring you choose one that not only provides snapshots and thin provisioning, but also active-active controllers and replication, and QoS. Read on to also gain access to instruction for a three-phase AFA implementation.
Posted: 26 Jun 2017 | Published: 19 Jun 2017

Tegile, a Western Digital brand

Case Study: Virtual StrongBox Expands Canadian Footprint
sponsored by TeraGo Networks
VIDEO: In this case study, Virtual StrongBox needed to expand their business into Canada. Learn how they were able to utilize a cloud service that provided a secure infrastructure, data sovereignty, enabled simultaneous backups, and more.
Posted: 03 Oct 2017 | Premiered: 31 Oct 2016

TeraGo Networks
1 - 25 of 479 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement