IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
101 - 125 of 472 Matches Previous Page  | Next Page
Legal Issues of Cloud Forensics
sponsored by Global Knowledge
WHITE PAPER: This white paper asks 5 essential questions about cloud forensics, revealing key issues a company or forensic examiner might face when collecting information from the cloud.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Global Knowledge

Building a Hybrid Storage Cloud
sponsored by SearchStorage.com
ESSENTIAL GUIDE: Access this exclusive Essential Guide from SearchCloudStorage.com to explore hype-free, expert insight into building a hybrid storage cloud. Inside, find articles on hybrid cloud storage products, the pros and cons of hybrid clouds, and learn about the true weak spots of the hybrid cloud model.
Posted: 22 Feb 2013 | Published: 22 Feb 2013

SearchStorage.com

How to more effectively manage all types of medical data
sponsored by BridgeHead and INHS
WEBCAST: Join independent consultant, Joe Marion, as he presents four strategies for adopting VNA, while taking into consideration the high availability needs of health care information. View this webcast now to learn about an approach that ensures the availability of DICOM images.
Posted: 20 Feb 2013 | Premiered: Feb 19, 2013

BridgeHead and INHS

Traditional Backup vs. Intelligent Business Continuity
sponsored by Datto, Inc.
DATA SHEET: Searching for an alternative to your insufficient tape, disk or NAS backup solution? Check out this quick data sheet to examine a side-by-side comparison of the capabilities of traditional backup vs. intelligent business continuity. You'll notice a stark contrast in each of ten critical backup categories.
Posted: 31 Jan 2013 | Published: 31 Jan 2013

Datto, Inc.

Protecting Vital Business Data from Natural Calamities
sponsored by Iron Mountain
WHITE PAPER: In this article, explore the case for business continuity and check out some stats proving how necessary a disaster recovery/business continuity plan is in today's treacherous physical and digital climates. Read on now to learn what to consider when making a DR/BC assessment and take the best actions to protect what's yours.
Posted: 30 Nov 2012 | Published: 16 Oct 2012

Iron Mountain

Sparking a Plan: Offsite Tape Storage and Smarter Protection Against the Elements
sponsored by Iron Mountain
WHITE PAPER: There's always a chance your data can be destroyed or damaged if it's only stored in one place, so while it's important to secure your on-site storage against the elements, it can't hurt to look into partnering with an off-site tape storage and data restoration pro. This article explains why.
Posted: 30 Nov 2012 | Published: 17 Oct 2012

Iron Mountain

Secure Offsite Data Storage: It Keeps You Running
sponsored by Iron Mountain
TECHNICAL ARTICLE: Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage.
Posted: 28 Nov 2012 | Published: 22 Oct 2012

Iron Mountain

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Forrester Total Economic Impact Study of IBM Storwize V7000
sponsored by IBM
WHITE PAPER: In June 2011, IBM commissioned Forrester Consulting to examine the total economic impact and potential ROI that enterprises may realize by deploying Storwize V7000. Read this white paper to learn the results.
Posted: 16 Nov 2012 | Published: 30 Apr 2012

IBM

Disaster Recovery Strategy Building
sponsored by Dell, Inc.
PRESENTATION TRANSCRIPT: In this transcript of a video by expert Jon Toigo, founder and CEO of Toigo Partners International outlines what should go into a disaster prevention strategy and why, above all, data must be protected. Also discussed - the importance of data restore time.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

Dell, Inc.

Clustered SAN enables seamless scaling and greater storage efficiency
sponsored by NetApp
WHITE PAPER: Storage systems today must match agility with proven, diversified I/O performance to satisfy an enterprise's changing needs. NetApp has benchmarked superior I/O performance in their FAS6240 Clustered SAN storage array, resulting in its ranking as Silverton Consulting's Enterprise OLTP Champion of Champions™ for 1Q-2013.
Posted: 14 Mar 2013 | Published: 28 Dec 2012

NetApp

8 Questions to Ask Before Moving to the Cloud
sponsored by Symantec Corporation
EGUIDE: Access this exclusive SearchCloudStorage.com E-Guide to discover eight questions you should ask before deciding if cloud storage can satisfy your company's needs and learn about considerations you must keep in mind to best determine your organization's storage primary use case.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

Symantec Corporation

FAQ: What is Health Data Archiving?
sponsored by HP & Intel®
EGUIDE: Due to the federal Health Information Portability and Accountability Act (HIPAA), health care facilities are required to save enormous amounts of patient data every year. As a result, data archiving should be a key part of every facility's IT plan. Access this eguide for a guide to selecting the right archiving approach to meet your storage needs.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

HP & Intel®

The Importance of High-Availability Systems in Disaster Recovery Plans
sponsored by Neverfail
EGUIDE: Learn why high-availability systems are integral components of disaster recovery plans in today's always-on business climate by checking out this expert SearchDisasterRecovery.com E-Guide.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

Neverfail

5 Keys to Successful VM Backup
sponsored by Quantum Corporation
EGUIDE: Check out this expert E-Guide to learn the top 5 data protection pitfalls of VMs and how to avoid them.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

Quantum Corporation

Managing the Information that Drives the Enterprise Storage: Focus on Virtual Desktops and Storage
sponsored by Dell, Inc.
EBOOK: Planning and managing storage capacity in a VDI poses unique challenges. Check out this e-book to learn VDI best practices and hear VDI success stories before getting started on your project.
Posted: 02 Jan 2013 | Published: 07 Apr 2011

Dell, Inc.

Big Data: Impact on Storage Systems, Processes and Budgets
sponsored by Cleversafe
EGUIDE: The exact definition of big data is still shaky for most, but experts agree that big data analytics and retention are impacting storage in a huge way. Explore this impact and gain insight into big data's other effects on storage processes and budgets, plus learn how vendors are responding to big data challenges in this expert E-Guide.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Cleversafe

Is cloud storage the right move for health care information?
sponsored by EMC Isilon
EGUIDE: This e-guide explores the most important considerations for health care organizations thinking about cloud data backup. Inside, uncover the steps you'll need to take when venturing into a cloud data backup plan, as well as how to prioritize your data.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

EMC Isilon

The pros and cons of health care storage systems
sponsored by EMC Isilon
EGUIDE: This e-guide breaks down the pros and cons of the major storage systems in use today and offers impartial advice on how you can find which would work best in your health care organization.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

EMC Isilon

Cloud-Based Email Archiving Pros and Cons
sponsored by Symantec Corporation
EGUIDE: Explore the benefits and downfalls of cloud-based email archiving in this expert E-Guide brought to you by SearchStorage.com. Find key criteria you shouldn't overlook when considering archiving in the cloud and learn why it's essential to know the ins and outs of whatever service in which you intend to invest.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

FAQ Guide: Data Backup & Security Pain Points
sponsored by Quantum Corporation
EGUIDE: This FAQ Guide can help you get started on the right path to securing your stored and backed up data. Access it now to find questions and answers about data encryption challenges and appliances, cloud storage security, and tape, host-based or disk encryption approaches.
Posted: 31 Oct 2012 | Published: 31 Oct 2012

Quantum Corporation

Emerging StorageTechniques in Health Care
sponsored by Asigra
EGUIDE: This essential guide on emerging storage techniques in health care demonstrates how, with a little creativity, organizations can benefit from the new cloud storage techniques that make electronic information easier to manage.
Posted: 18 Oct 2012 | Published: 18 Oct 2012

Asigra

Protecting Healthcare Data in the Cloud: GNAX Health & Intel
sponsored by Intel
WHITE PAPER: This exclusive resource demonstrates how health care facilities can protect sensitive patient data in the cloud, while preserving the server performance that users require – all while ensuring compliance with HIPAA and HITECH.
Posted: 17 Oct 2012 | Published: 17 Oct 2012

Intel

Scale-Out NAS for Unstructured Data
sponsored by Red Hat
WHITE PAPER: This white paper introduces a scale-out NAS software solution for cloud environments designed to meet unstructured data requirements and provide a high-performance, virtualized and centrally managed storage pool. Able to scale both capacity and performance, you'll be able to achieve an unprecedented price/performance ratio without compromise.
Posted: 28 Sep 2012 | Published: 14 Feb 2012

Red Hat

Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT: Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012

WatchDox
101 - 125 of 472 Matches Previous Page    3 4 5 6 7 8    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement