IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
176 - 200 of 458 Matches Previous Page  | Next Page
Fast Track to Archived Data Access
sponsored by Iron Mountain
WHITE PAPER: Read this paper for best practices and keys to help you prepare for a compliance or audit request. Learn how an offsite partner can help improve your data protection, accessibility and recoverability, and receive 7 keys to help improve your security and backup policies. Also receive checklist of 4 keys to help you better access your information.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Backup Partner Criteria for Smart Partnerships
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover how an offsite storage partner can be the answer to your content security and storage challenges. Learn about the advantages associated with offsite storage, discover how to define your needs and find the best potential backup partner you can, receive 4 key questions to ask regarding storage partners and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Is Your Complete Restoration Plan on Track?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Risk Management: How Vulnerable is Your Backup Media?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for tips to help you securely manage backup and recovery processes. Discover the importance of developing a chain of custody when it comes to data, learn how authorization and access restrictions can help keep your information secure, and receive best practices for choosing an offsite data backup/protection partner.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Plan Now, Worry Less After
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a guide to compiling a successful post-disaster checklist. Receive 4 post-disaster musts, learn 3 keys to staying afloat following a disaster, discover the importance of internal communication during downtime and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Build a Better Data and Recovery Backup Plan: The First Five Steps
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a complete backup breakdown. Included in this guide are the first five steps to take when building a data backup and recovery strategy, and best practices to help you develop and start improving your backups today. Read on for more.
Posted: 01 Mar 2012 | Published: 24 Feb 2012

Iron Mountain

Send Your Tapes to a Better Climate
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a checklist of key questions to ask before choosing an offsite tape storage partner. Learn what the ideal requirements for tape storage are, discover what you should be looking for in a potential storage partner and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

BackupCare "Lights-Out" Backup Assistance
sponsored by Iron Mountain
DATA SHEET: As IT becomes increasingly global, managing remote offices and data centers is becoming a sizable challenge for administrators and organizations with already dwindling budgets. There is, however, a solution. Check out this white paper to learn exactly what it is.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

When It's Time for an Audit, Will You Be Ready?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices on how to best prep yourself for the audit process - learn how to create a backup and recovery plan that includes the right audit and accountability features, discover four keys to help you on the path to compliance and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Overcome 5 Common Backup Challenges With Tape
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn where tape stands today among other storage media, and discover where tape may fit into your backup infrastructure.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Who's Got the Talent? Build an A-List Backup Team
sponsored by Iron Mountain
WHITE PAPER: The key to a successful disaster recovery strategy is planning. Read this white paper to learn about the importance of being proactive about potential problems, discover how you can properly rehearse for disaster and understand the importance of knowing who's in charge of what when the time comes. Read on for more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Remote and Branch Office Backup and Recovery 101
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices when planning and managing a comprehensive offsite backup and recovery strategy. Learn how careful planning with remote or branch offices (ROBOs) can allow for seamless data protection without compromise, and discover key questions to ask when planning remote office backup strategies.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Encryption Strategies: Decoded
sponsored by Iron Mountain
WHITE PAPER: Find out exactly how and why in this white paper. Discover best practices for determining what data is most important and should be encrypted, learn exactly how encryption works and receive a checklist of three critical aspects of any encryption plan. Read on to learn more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Podcast- Tape vaulting: What you need to know about tape backup and archiving
sponsored by Iron Mountain
PODCAST: If you don’t backup to tape now, is it worth starting? Or are the recent developments in tape only worthwhile for those who have already invested in the technology? Learn the answers to these questions and more by checking out this FAQ podcast featuring insight from top industry analyst Lauren Whitehouse.
Posted: 29 Feb 2012 | Premiered: Feb 28, 2012

Iron Mountain

Risk Assessment: A Vital Step in Developing a Best Practice Program
sponsored by Iron Mountain
DATA SHEET: The increasing regulatory demands surrounding the protection of personally identifiable information is placing more importance on your offsite tape program. Although sound disaster and data recovery plans are essential, the future will require visibility and auditability across your entire tape program.
Posted: 29 Feb 2012 | Published: 16 May 2011

Iron Mountain

Offsite Tape Vaulting: Secure, Offsite Data Backup and Quick, Reliable Recovery
sponsored by Iron Mountain
DATA SHEET: Check out this brief white paper to learn about an offsite tape vaulting service that enables your organization to quickly recover your data in the event of a disaster or unplanned downtime, and also enables you to track where your backup tapes are at all times (i.e. in transit, handling/storage, etc.). Read on to learn more.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Which Way to the Vault? Hassle-free Tape Backups
sponsored by Iron Mountain
WHITE PAPER: Loaded with a step-by-step list of how to prepare, move and keep tabs on your data, along with four best practices for moving data to an offsite vault, this resource has the information you need to ensure you're properly transporting and managing offsite tapes.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Secure Tape Vaulting Strategies for Serious Data Protection
sponsored by Iron Mountain
WHITE PAPER: Your tapes deserve the best protection possible. Ensure they get it by reading this white paper filled with best practices for keeping data safe and secure. Discover the benefits associated with data housed onsite vs. offsite, learn 3 key questions to ask regarding your existing backup strategy, discover four keys to tape success and more.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

The (Business) Day After: Making a Double Rebound from Disaster
sponsored by Iron Mountain
WHITE PAPER: This white paper has today's best practices and keys to help you get back on your feet even if your backup data has been lost. Receive a backup maintenance checklist with key questions to ask regarding your backup strategies, discover common backup challenges and more. Read on to ensure you're prepared for the worst.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Data Archiving: 10 Common Mistakes (and how to avoid them)
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for ten of today's worst backup practices and discover how to fix these errors if you've been committing them. Discover keys to help get your backups back on track, learn what questions to ask regarding your backups, and receive tips to stay on top of your archiving. Read on for more.
Posted: 27 Feb 2012 | Published: 27 Feb 2012

Iron Mountain

Intelligent Service Automation Working with Service Oriented Architecture
sponsored by Kaminario
WHITE PAPER: The dependency of background (batch) processing still remains when your applications move to a service oriented architecture (SOA). Read this white paper to learn how to ease the SOA transition with technology that enables the inclusion of background processing.
Posted: 05 Mar 2012 | Published: 31 Dec 2010

Kaminario

The Storage Side of Private Clouds: Keeping it Light and Inexpensive
sponsored by DataCore Software Corporation
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about recent developments and best practices regarding private cloud storage. Discover the keys to a successful private cloud infrastructure, receive planning tips to help you get the most out of your storage before adopting the cloud, learn about the potential of hybrid cloud solutions and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

DataCore Software Corporation

Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Course Catalog: Simpana Training Services and Programs
sponsored by CommVault Systems, Inc.
VIRTUAL TRADESHOW: Simpana Training Services Course Catalog January-June 2012.
Posted: 29 Feb 2012 | Premiered: Feb 29, 2012

CommVault Systems, Inc.

Virtual Server Protection with NetApp Storage and CommVault SnapProtect
sponsored by CommVault Systems, Inc.
VIRTUAL TRADESHOW: This whitepaper defines a Virtual Infrastructure reference architecture based on VMware vCenter, NetApp storage and CommVault SnapProtect technology. These components deliver optimized storage and data protection for scalable virtual server deployments.
Posted: 28 Feb 2012 | Premiered: Feb 28, 2012

CommVault Systems, Inc.
176 - 200 of 458 Matches Previous Page    6 7 8 9 10 11    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement