IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
101 - 125 of 463 Matches Previous Page  | Next Page
Protecting Vital Business Data from Natural Calamities
sponsored by Iron Mountain
WHITE PAPER: In this article, explore the case for business continuity and check out some stats proving how necessary a disaster recovery/business continuity plan is in today's treacherous physical and digital climates. Read on now to learn what to consider when making a DR/BC assessment and take the best actions to protect what's yours.
Posted: 30 Nov 2012 | Published: 16 Oct 2012

Iron Mountain

Sparking a Plan: Offsite Tape Storage and Smarter Protection Against the Elements
sponsored by Iron Mountain
WHITE PAPER: There's always a chance your data can be destroyed or damaged if it's only stored in one place, so while it's important to secure your on-site storage against the elements, it can't hurt to look into partnering with an off-site tape storage and data restoration pro. This article explains why.
Posted: 30 Nov 2012 | Published: 17 Oct 2012

Iron Mountain

Secure Offsite Data Storage: It Keeps You Running
sponsored by Iron Mountain
TECHNICAL ARTICLE: Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage.
Posted: 28 Nov 2012 | Published: 22 Oct 2012

Iron Mountain

Making Strategic Use of Tape and Cloud Technologies for Offsite Data Protection
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights the importance of making strategic use of tape and cloud technologies for offsite data protection in health care. Read now to learn how you can craft a strategy that balances the benefits of tape and cloud. And discover how doing so will lead to efficiencies and cost savings.
Posted: 05 Nov 2012 | Published: 05 Nov 2012

Iron Mountain

Managing Data Growth and Access: The Security and Access Speed of On-Site Data Combined with the Efficiency of a Cloud Solution
sponsored by Iron Mountain
WHITE PAPER: This white paper demonstrates how a hybrid on-site/off-site storage structure can provide health care facilities with the flexibility needed to manage burgeoning patient data. Read now to learn how hybrid storage can assist with disaster recovery, capacity utilization, security and compliance, and much more.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Iron Mountain

The Importance of High-Availability Systems in Disaster Recovery Plans
sponsored by Neverfail
EGUIDE: Learn why high-availability systems are integral components of disaster recovery plans in today's always-on business climate by checking out this expert SearchDisasterRecovery.com E-Guide.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

Neverfail

5 Keys to Successful VM Backup
sponsored by Quantum Corporation
EGUIDE: Check out this expert E-Guide to learn the top 5 data protection pitfalls of VMs and how to avoid them.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

Quantum Corporation

Managing the Information that Drives the Enterprise Storage: Focus on Virtual Desktops and Storage
sponsored by Dell, Inc.
EBOOK: Planning and managing storage capacity in a VDI poses unique challenges. Check out this e-book to learn VDI best practices and hear VDI success stories before getting started on your project.
Posted: 02 Jan 2013 | Published: 07 Apr 2011

Dell, Inc.

Big Data: Impact on Storage Systems, Processes and Budgets
sponsored by Cleversafe
EGUIDE: The exact definition of big data is still shaky for most, but experts agree that big data analytics and retention are impacting storage in a huge way. Explore this impact and gain insight into big data's other effects on storage processes and budgets, plus learn how vendors are responding to big data challenges in this expert E-Guide.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Cleversafe

Is cloud storage the right move for health care information?
sponsored by EMC Isilon
EGUIDE: This e-guide explores the most important considerations for health care organizations thinking about cloud data backup. Inside, uncover the steps you'll need to take when venturing into a cloud data backup plan, as well as how to prioritize your data.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

EMC Isilon

The pros and cons of health care storage systems
sponsored by EMC Isilon
EGUIDE: This e-guide breaks down the pros and cons of the major storage systems in use today and offers impartial advice on how you can find which would work best in your health care organization.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

EMC Isilon

Cloud-Based Email Archiving Pros and Cons
sponsored by Symantec Corporation
EGUIDE: Explore the benefits and downfalls of cloud-based email archiving in this expert E-Guide brought to you by SearchStorage.com. Find key criteria you shouldn't overlook when considering archiving in the cloud and learn why it's essential to know the ins and outs of whatever service in which you intend to invest.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

BYOD Security Policy Considerations and Best Practices
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

Symantec Corporation

FAQ Guide: Data Backup & Security Pain Points
sponsored by Quantum Corporation
EGUIDE: This FAQ Guide can help you get started on the right path to securing your stored and backed up data. Access it now to find questions and answers about data encryption challenges and appliances, cloud storage security, and tape, host-based or disk encryption approaches.
Posted: 31 Oct 2012 | Published: 31 Oct 2012

Quantum Corporation

Emerging StorageTechniques in Health Care
sponsored by Asigra
EGUIDE: This essential guide on emerging storage techniques in health care demonstrates how, with a little creativity, organizations can benefit from the new cloud storage techniques that make electronic information easier to manage.
Posted: 18 Oct 2012 | Published: 18 Oct 2012

Asigra

Protecting Healthcare Data in the Cloud: GNAX Health & Intel
sponsored by Intel
WHITE PAPER: This exclusive resource demonstrates how health care facilities can protect sensitive patient data in the cloud, while preserving the server performance that users require – all while ensuring compliance with HIPAA and HITECH.
Posted: 17 Oct 2012 | Published: 17 Oct 2012

Intel

Scale-Out NAS for Unstructured Data
sponsored by Red Hat
WHITE PAPER: This white paper introduces a scale-out NAS software solution for cloud environments designed to meet unstructured data requirements and provide a high-performance, virtualized and centrally managed storage pool. Able to scale both capacity and performance, you'll be able to achieve an unprecedented price/performance ratio without compromise.
Posted: 28 Sep 2012 | Published: 14 Feb 2012

Red Hat

Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT: Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012

WatchDox

Storage Virtualization Benefits and Drawbacks
sponsored by EMC Isilon
EGUIDE: This SearchStorage.com special report addresses both the benefits and disadvantages of storage virtualization as to help keep you up to speed with the ins and outs of this technology.
Posted: 12 Sep 2012 | Published: 13 Dec 2011

EMC Isilon

Tape Vaulting: What You Need to Know About Tape Backup and Archiving
sponsored by Spectra Logic Corporation
EGUIDE: Check out this FAQ guide to stay up on the current state of tape backup technology.
Posted: 12 Sep 2012 | Published: 03 May 2012

Spectra Logic Corporation

The Resurgence of Tape: Recent Developments in Tape Storage Systems
sponsored by Fujifilm Recording Media USA, Inc.
EGUIDE: In this SearchDataBackup.com EGuide, storage gurus Rich Castagna, Andrew Burton and Terri McClure discuss the current landscape of the tape market and its continuing role in the data center. Read on to learn about LTFS and LTO-5, recent developments in tape systems, tape’s contribution in the cloud and much more.
Posted: 12 Sep 2012 | Published: 01 Nov 2011

Fujifilm Recording Media USA, Inc.

VW Credit, Inc. Drives Better Backups with ExaGrid
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this brief case study today to explore one company's journey to better backups.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

ExaGrid Systems, Inc.

8 Considerations for Evaluating Disk-Based Backup Solutions
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this white paper for 8 critical considerations to keep in mind before deciding on a disk-based backup appliance. Explore the importance of backup, restore, dedupe and scalability capabilities when shopping for a backup solution, and gain the insight you need to make a confident and informed decision when it comes to backup.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

ExaGrid Systems, Inc.

Symantec NetBackup 5220 Appliance
sponsored by DLT Solutions
WEBCAST: Watch this webcast today for an introduction to an emerging backup system purpose-built to handle the challenges faced by storage admins in the face of today's data growth. Explore the features and specs this hardware has to offer, and learn what benefits it can bring your organization right out of the box.
Posted: 02 Aug 2012 | Premiered: Aug 2, 2012

DLT Solutions

Data Protection: The Butterfly Effect
sponsored by IBM.
WEBCAST: This comprehensive webcast explores how your organization can meet today's and tomorrow's data protection challenges from an easy-to-read single-pane report. Watch now to learn more.
Posted: 25 Jul 2012 | Premiered: Jul 25, 2012

IBM.
101 - 125 of 463 Matches Previous Page    3 4 5 6 7 8    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement