IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
201 - 225 of 466 Matches Previous Page  | Next Page
Who's Got the Talent? Build an A-List Backup Team
sponsored by Iron Mountain
WHITE PAPER: The key to a successful disaster recovery strategy is planning. Read this white paper to learn about the importance of being proactive about potential problems, discover how you can properly rehearse for disaster and understand the importance of knowing who's in charge of what when the time comes. Read on for more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Should You Chase the Cloud?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn how you might want to include cloud technologies as part of a complete data backup and recovery strategy. Discover three steps to take to determine if the cloud is right for you, learn about security concerns and more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Remote and Branch Office Backup and Recovery 101
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices when planning and managing a comprehensive offsite backup and recovery strategy. Learn how careful planning with remote or branch offices (ROBOs) can allow for seamless data protection without compromise, and discover key questions to ask when planning remote office backup strategies.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Encryption Strategies: Decoded
sponsored by Iron Mountain
WHITE PAPER: Find out exactly how and why in this white paper. Discover best practices for determining what data is most important and should be encrypted, learn exactly how encryption works and receive a checklist of three critical aspects of any encryption plan. Read on to learn more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Podcast- Tape vaulting: What you need to know about tape backup and archiving
sponsored by Iron Mountain
PODCAST: If you don’t backup to tape now, is it worth starting? Or are the recent developments in tape only worthwhile for those who have already invested in the technology? Learn the answers to these questions and more by checking out this FAQ podcast featuring insight from top industry analyst Lauren Whitehouse.
Posted: 29 Feb 2012 | Premiered: Feb 28, 2012

Iron Mountain

E-guide: Why you should keep tape in your DR plan
sponsored by SearchStorage.com
EGUIDE: Check out this guide to learn about the value of tape in a DR strategy, learn about the latest developments in tape technology and discover what purpose (if any) tape will serve in the cloud. Read on for more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

SearchStorage.com

Eguide: Why Choosing a Data Protection Solution is Critical
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to learn about the importance of proper data protection practices and receive tips to help you devise the best strategy to protect your most important information. Read on to learn more.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Offsite Tape Vaulting: Secure, Offsite Data Backup and Quick, Reliable Recovery
sponsored by Iron Mountain
DATA SHEET: Check out this brief white paper to learn about an offsite tape vaulting service that enables your organization to quickly recover your data in the event of a disaster or unplanned downtime, and also enables you to track where your backup tapes are at all times (i.e. in transit, handling/storage, etc.). Read on to learn more.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Which Way to the Vault? Hassle-free Tape Backups
sponsored by Iron Mountain
WHITE PAPER: Loaded with a step-by-step list of how to prepare, move and keep tabs on your data, along with four best practices for moving data to an offsite vault, this resource has the information you need to ensure you're properly transporting and managing offsite tapes.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Secure Tape Vaulting Strategies for Serious Data Protection
sponsored by Iron Mountain
WHITE PAPER: Your tapes deserve the best protection possible. Ensure they get it by reading this white paper filled with best practices for keeping data safe and secure. Discover the benefits associated with data housed onsite vs. offsite, learn 3 key questions to ask regarding your existing backup strategy, discover four keys to tape success and more.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

The (Business) Day After: Making a Double Rebound from Disaster
sponsored by Iron Mountain
WHITE PAPER: This white paper has today's best practices and keys to help you get back on your feet even if your backup data has been lost. Receive a backup maintenance checklist with key questions to ask regarding your backup strategies, discover common backup challenges and more. Read on to ensure you're prepared for the worst.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

Iron Mountain

Data Archiving: 10 Common Mistakes (and how to avoid them)
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for ten of today's worst backup practices and discover how to fix these errors if you've been committing them. Discover keys to help get your backups back on track, learn what questions to ask regarding your backups, and receive tips to stay on top of your archiving. Read on for more.
Posted: 27 Feb 2012 | Published: 27 Feb 2012

Iron Mountain

Build a Better Data and Recovery Backup Plan: The First Five Steps
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for a complete backup breakdown. Included in this guide are the first five steps to take when building a data backup and recovery strategy, and best practices to help you develop and start improving your backups today. Read on for more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Iron Mountain

Backup Software: Nine Must-Ask Questions
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 9 key questions to ask when shopping for backup software solutions. Learn how to accurately define your needs and expectations, and know what to look for to determine if a particular solution will meet them or not. Read on to learn more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Iron Mountain

10 Cloud Storage Requirements to Know
sponsored by SearchStorage.com
EGUIDE: Check out this SearchCloudStorage.com E-Guide for a back-to-basics understanding of cloud technology. In this guide you'll discover 10 key cloud storage requirements and learn how to get started on the right foot when attempting the move to a cloud-based infrastructure. Read on to learn more.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

SearchStorage.com

Best Practices for Deploying SSD
sponsored by SearchStorage.com
EBRIEF: Check out this E-Brief for best practices and key considerations regarding SSD purchase and deployment. Learn the basics of solid state storage, determine if SSD is a good fit for your company and learn the keys to success before implementing.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

SearchStorage.com

Maximize Your Storage Spend by Doing More with Less - Transcript
sponsored by Red Hat
PRESENTATION TRANSCRIPT: Download this presentation transcript to discover how to free yourself from vendor lock-in by expensive proprietary storage hardware companies, and learn how you can take advantage of today's new wave of storage buying. Find out how you can do more with your existing storage and spend less time and money to accommodate changing workloads.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

Red Hat

Case Study: Storage Virtualisation at MittMedia
sponsored by DataCore Software Corporation
CASE STUDY: Check out this case study to discover how MittMedia was able to consolidate their operations and today utilize only two data centers. Learn about the technologies the company implemented in order to keep IT running smoothly during this process, discover the upgrades MittMedia made to their virtual servers and more.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

DataCore Software Corporation

Top 10 SAN Tips and Lessons Learned From Virtualization
sponsored by StarWind Software Inc.
WHITE PAPER: The key to ensuring success in virtual server environments is to keep up with the latest best practices and recommendations for utilizing SANs in a virtual data center. Featuring 10 tips for SAN management in virtual environments, this white paper has the information you need to keep your storage and your virtual servers running smoothly.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

StarWind Software Inc.

Creating the Ideal SMB SAN with StarWind and vSphere
sponsored by StarWind Software Inc.
WHITE PAPER: Check out this white paper for best practices regarding shared storage/SAN management in today's virtual environments. Discover what virtualization features demand shared storage, learn what tools and knowledge you'll need to keep your storage running smoothly and discover how to unlock the full array of benefits promised by virtualization.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

StarWind Software Inc.

Eguide: Tape’s Reincarnation in the Cloud
sponsored by Iron Mountain
EGUIDE: Check out this E-Guide to learn whether or not tape can play a role in cloud backup and data protection operations. Discover the changing requirements of a cloud-based infrastructure, and learn how tape technology may be on track to help administrators maintain cost-effective backups.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

Iron Mountain

The Rising Impact of Virtualization on Data Backup and Recovery
sponsored by Acronis
WHITE PAPER: This white paper highlights the rise of virtualization and explores what businesses today can do in terms of adjusting backup and recovery functions to maintain a functioning virtual data center. Learn what applications are most commonly virtualized today, discover the differences in backup between small and large organizations and more.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

Acronis

HP 3Par Secure Service Architecture
sponsored by HP and Intel
WHITE PAPER: Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

HP and Intel

Eguide: Expert Tips - Storage Management in Virtual Environments
sponsored by DLT Solutions
EGUIDE: Check out this SearchServerVirtualization.com E-Guide to discover today's best practices for storage management of virtual environments. Discover how to estimate storage capacity requirements using four key factors, learn how to select optimal memory and CPU for virtualization and more.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

DLT Solutions

Tip Guide: Top Five Tips for Managing Storage in a Virtual Server Environment
sponsored by DLT Solutions
EGUIDE: Check out this tip guide for 5 best practices to better manage your virtual servers. In this guide you'll learn how to better balance your storage workload, understand the differences between storage for virtualized servers and desktops, learn how to utilize thin provisioning, improve storage utilization and more.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

DLT Solutions
201 - 225 of 466 Matches Previous Page    7 8 9 10 11 12    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement