IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
1 - 25 of 453 Matches Previous Page  |  Next Page
File Sync and Share: There’s Too Much at Stake to Compromise
sponsored by Hitachi Data Systems
WHITE PAPER: Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Better Together: Security and Collaboration with Backup and Box
sponsored by Code42
WHITE PAPER: This white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Code42

Case Study: Disc Comfort Fuses Image Management and the Cloud
sponsored by Ambra
CASE STUDY: Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a cloud imaging suite that will reduce time spent loading and viewing patient CDs. Additionally, discover how transitioning on premise CDs to the cloud for storage and retrieval will transform patient care.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Ambra

City of Garland Improves City Services With Flash Storage
sponsored by Pure Storage
CASE STUDY: Delivering efficient services to today's modern cities places significant demands on IT departments in charge of municipalities around the country. In this brief yet enlightening case study, learn how the City of Garland, TX got more than they bargained for (in the best way possible of course) from their flash storage solution.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Pure Storage

SLA-Driven Data Protection Modernization: An ESG Video Interview
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 20 Sep 2016 | Premiered: 31 Mar 2016

IBM

Flash Storage Drives New Efficiencies in Government
sponsored by Pure Storage
WHITE PAPER: Government agencies' existing storage infrastructures often can't keep up with the need to store more and more data, because they aren't scalable or fast enough. This white paper details how these agencies' are using flash storage to address the major pain points of performance, manageability and cost prevalent with traditional storage.
Posted: 15 Sep 2016 | Published: 29 Jul 2016

Pure Storage

Measures to Protect Our Growing Data
sponsored by Pure Storage
RESOURCE: The data deluge has arrived and at any one time, federal agencies will store an average of 2.63 petabytes. Flash storage provides the capacity, performance and cost-effectiveness needed but still leaves the question of security. Read on to learn how governments intend to keep their data safe and secure.
Posted: 15 Sep 2016 | Published: 15 Jul 2016

Pure Storage

SAP HANA® Backup and Recovery using Pure Storage® Snapshots
sponsored by Pure Storage
WHITE PAPER: This paper covers the necessary steps to take a snapshot of a SAP HANA® instance for backup purposes. It also explains how to restore the database from the snapshot.
Posted: 12 Sep 2016 | Published: 31 Jul 2016

Pure Storage

Flemish Government's digital transformation delivers 100 million Euro in savings for the taxpayers
sponsored by Hewlett-Packard Enterprise
CASE STUDY: This case study explains how the Flemish government and Hewlett-Packard unified all of the city's information into one system, saving millions of euro. Find out how shared services strategy and platform technology reduces data duplication, provides an infrastructure to access these sources, and more.
Posted: 12 Sep 2016 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

Six Steps to a More Secure Business: Mitigating the Threats to Your Data
sponsored by NTT ICT
RESOURCE: Discover how to mitigate the risks posed by data breaches, compliance violations, reputational damage, and business downtime, backing up your critical data as new technologies introduce unpredictable risk into the enterprise. Access the outlined 6 steps to implement better data protection.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

NTT ICT

Five Ways to Protect Your Digital Assets
sponsored by NTT ICT
RESOURCE: Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

NTT ICT

Software-Defined Storage Suite: How It Works
sponsored by IBM
VIDEO: In today's rapidly changing business environment, data management is becoming a serious challenge for many companies. This video discusses one Software-Defined Storage suite designed to change the economics of storage. Watch now to learn about this suite and how it can store data at optimal cost, helping to maximize performance and ensure security.
Posted: 31 Aug 2016 | Premiered: 22 Dec 2015

IBM

Is the Hybrid Storage Array Dying?
sponsored by Dell EMC
EGUIDE: Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC

Utilizing SSD Flash and Object Storage: Should Both Be Used Simultaneously?
sponsored by Dell EMC
EGUIDE: Is it possible to increase object storage performance by as much as 100 times? Now may be the time to deploy SSD flash and object storage together, and in this guide, learn the performance and reliability benefits of utilizing both simultaneously. As a bonus, read on to access seven tips for improving data storage efficiency.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC

Moen's All-Flash Arrays Enable Improved SAP Performance, Better Inventory Planning
sponsored by Dell EMC
CASE STUDY: This case study illuminates the benefits all-flash storage arrays, and in it you will discover how flash arrays improve SAP performance and accelerate data access. Read on to learn how to consolidate IO-intensive SAP applications, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Dell EMC

Choosing the Right Public Cloud for Better Data Protection
sponsored by Dell, Inc.
WHITE PAPER: Integrating infrastructure-as-a-service (IaaS) and data protection software can help your enterprise solve the complexity and cost challenges of protecting data. Discover what public cloud capabilities and data protection software capabilities your enterprise should focus on when choosing a solution for your needs.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Dell, Inc.

Protecting Critical Data in Virtual Environments
sponsored by IBM
WHITE PAPER: VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.
Posted: 25 Aug 2016 | Published: 31 Dec 2015

IBM

OCHIN Utilizes All-Flash Systems to Improve Healthcare Quality for Ambulatory Providers
sponsored by Dell EMC
CASE STUDY: Consider the move from legacy hybrid storage to all-flash. In this case study, learn how to regain workforce—and workload—productivity by investing in all-flash storage. Read on to reduce non-production downtime and recover workforce productivity losses with this scalable, secure environment.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Dell EMC

Enterprise-Class Resiliency and Availability with Flash
sponsored by IBM
VIDEO: Andy Walls, CTO at IBM, provides an in-depth look at highly available flash storage solutions that can consolidate all of your workloads in one place. Discover the benefits your enterprise can achieve with these flash systems, including consistent performance, protection against any type of failure, and more.
Posted: 17 Aug 2016 | Premiered: 27 Apr 2016

IBM

Future-Proofing Public Safety Storage
sponsored by Red Hat
BROCHURE: Using body cameras as a chief example, this resource explores ways to bring choice, flexibility, and security to storage investments. Access now to learn more about on-premise vs. cloud considerations and how to secure your data.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Red Hat

Storage Health Check
sponsored by Red Hat
RESOURCE: This resource explores the use of a storage health check to help you get the most out of your storage investment. Find out how to conduct a comprehensive analysis of your storage instance, optimize performance, and implement best practices by evaluating 7 key areas.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Red Hat

"Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs
sponsored by NTT ICT
VIDEO: If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.
Posted: 05 Aug 2016 | Premiered: 30 May 2016

NTT ICT

Converged Data Protection for Continuously Available Applications
sponsored by NTT ICT
WHITE PAPER: Learn how to combine the availability of instant local and remote array-based snapshots with cost efficient disk-based backup, in order to provide multiple recovery points and rapid data restore times. Read on to examine a centralized recovery manager that maintains constant app availability.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection
sponsored by NTT ICT
WHITE PAPER: This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

NTT ICT

Application-managed Data Protection for HPE 3PAR StoreServ Storage
sponsored by NTT ICT
WHITE PAPER: In this white paper, examine the benefits of combining backups and snapshots in application-managed, storage-integrated, end-to-end data protection. Read on to simplify your evolving data environment, bolster backup windows and recovery time, and access multi-streaming support.
Posted: 03 Aug 2016 | Published: 03 Aug 2016

NTT ICT
1 - 25 of 453 Matches Previous Page    1 2 3 4    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement