IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
226 - 250 of 421 Matches Previous Page  |  Next Page
22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers.
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

ComputerWeekly.com

Global Disaster Recovery Index: 2011
sponsored by ComputerWeekly.com
WHITE PAPER: Being fit for business is imperative for all countries participating in a highly competitive global economy. For organisations around the world this means being able to continue to operate in the event of IT failure or major disaster, whether man-made or natural.
Posted: 24 Oct 2011 | Published: 31 Jan 2011

ComputerWeekly.com

CW+ Quocirca report: Privileged user management
sponsored by ComputerWeekly.com
WHITE PAPER: IT managers everywhere feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant themselves and/or their colleagues in order to do their jobs.
Posted: 20 Oct 2011 | Published: 18 Oct 2010

ComputerWeekly.com

Efficient Management of Legal and Compliance Requests on D2D Storage
sponsored by Index Engines
WHITE PAPER: This white paper features today's best practices regarding efficient data management and provides you with the information you need to optimize your existing storage infrastructure and increase efficiency throughout your data center. Read on to learn more.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Index Engines

EMC Isilon OneFS Operating System - Powering the Isilon Scale-out Storage Platform
sponsored by EMC Isilon
WHITE PAPER: This white paper provides an introduction to the EMC Isilon OneFS operating system, the foundation of the Isilon scale-out storage platform. In this paper, you'll learn about the benefits of storage scaling and gain an overview of the architecture of this platform.
Posted: 12 Dec 2011 | Published: 01 Apr 2011

EMC Isilon

Closing the Storage Virtualization Gap with EMC Isilon
sponsored by EMC Isilon
WHITE PAPER: Storage in virtual environments can get tricky - with traditional backup methods unable to keep up with the demands of virtualization, new strategies are essential. This white paper from ESG introduces a new virtual storage solution designed to maintain efficiency and meet the growing demands of server virtualization. Read on to learn more.
Posted: 09 Dec 2011 | Published: 01 May 2011

EMC Isilon

Presentation Transcript - Hyper ISE: The Next Generation of Performance-Driven Storage
sponsored by XIO
PRESENTATION TRANSCRIPT: Check out this presentation transcript for an introduction to this technology and the challenges it's designed to overcome. You’ll learn how this technology differs from other currently available storage solutions, and explore the technological advancements that make this storage solution unlike any other. Read on to learn more.
Posted: 09 Dec 2011 | Published: 09 Dec 2011

XIO

Symantec SMB Threat Awareness Poll
sponsored by Symantec Corporation
WHITE PAPER: Symantec conducted its SMB Threat Awareness Poll in September 2011, asking 1,900 SMBs how familiar they are with threats, and what they are doing to protect themselves. This white paper features the results of this survey, and provides best practices and recommendations to help your organization's data stay secure. Read on to learn more.
Posted: 01 Dec 2011 | Published: 22 Nov 2011

Symantec Corporation

VMware Backup Software and a vSphere Backup Solution Checklist
sponsored by HP
EGUIDE: Buying backup software for a virtualized environment is way more complicated than buying software for traditional servers. Before you go out and explore the different backup options available, check out the VMware backup software and vSphere backup solution checklist featured in this E-Guide.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

HP

E-Guide: Backup Reporting Software Keeps Backups 'Honest'
sponsored by HP
EGUIDE: Backups aren't always perfect, and it's not always easy to tell when they're not working correctly. Fortunately there's backup reporting software to keep things in check. Check out this expert E-Guide to learn the benefits and different types of backup reporting software available today.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

HP

Simplifying Management Through Windows Storage Consolidation on Dell Powervault NX3000 Nas Appliances
sponsored by Dell, Inc.
WHITE PAPER: This white paper provides a brief introduction to several technologies that can help you reap the benefits of storage consolidation. Read on to learn the keys to creating a unified storage infrastructure, and how to lower costs throughout your storage infrastructure without compromising efficiency or performance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

Dell, Inc.

Solid State Disks and Storage Tiering
sponsored by Dell, Inc.
WHITE PAPER: Check out this white paper for a technical introduction to storage tiering and its implementation. You'll learn exactly how tiered storage works, and how to determine if it's the right strategy for your organization. Finally, you'll receive recommendations on how to evaluate available tiered solutions and determine which will best meet your needs.
Posted: 30 Nov 2011 | Published: 30 Nov 2011

Dell, Inc.

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn about some of the most common pitfalls associated with backups and how to avoid them. You'll learn about the repercussions of poor/failed backups, and learn how to establish a backup strategy that can ensure minimal downtime during a disaster. Read on to learn more.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Symantec Corporation

Symantec 2011 SMB Disaster Preparedness Survey
sponsored by Symantec Corporation
WHITE PAPER: This white paper features the results of Symantec's second SMB disaster preparedness survey, and provides recommendations to help your organization establish and maintain a successful disaster recovery strategy.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Symantec Corporation

ISE Storage System: Fast, Reliable, Easy
sponsored by XIO
WHITE PAPER: The ISE storage system is an easy to use, high performance fibre channel storage system supporting SAS HDDs. ISE storage system provides high performance during its complete lifecycle due to the way it handles vibration, heat dissipation, data placement and drive reliability. Check out this white paper to learn more about this new technology.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

XIO

Essential Guide to Virtual Data Protection
sponsored by SearchStorage.com
EZINE: In just a few short years, we’ve gone from struggling to apply effective data protection to virtualized environments with outdated tools to a variety of solid alternatives. Your job now is to find the best solution for your company’s environment.  This Storage magazine Essential Guide should help make it just a little bit easier.
Posted: 07 Nov 2011 | Published: 03 Nov 2011

SearchStorage.com

FAQ Guide: Auto Tiering Crucial to Storage Efficiency
sponsored by Dell Compellent
EGUIDE: This expert E-Guide featuring Jeff Boles, senior analyst at Taneja Group, discusses the importance of auto tiering in storage today.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

Dell Compellent

Presentation Transcript: Addressing Data Protection Challenges
sponsored by Dell Software
PRESENTATION TRANSCRIPT: This presentation transcript discusses the data protection challenges faced by CIOs and IT organisations in an ever-changing, dynamic, data-growth-driven industry. Watch to explore how you can simplify data protection across physical or virtual environments and applications, get faster return on investment, and reduce the TCO for data protection.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

Dell Software

Remote Laptop Backup 101
sponsored by Code42
EGUIDE: This expert E-Guide dives into everything laptop backup as it explores the challenges of remote laptop backup today, different remote laptop backup approaches and best practices. Read on to learn more.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

Code42

6 Storage Efficiency Technologies: What They Do and How You Save
sponsored by IBM
EGUIDE: This E-Guide can help you achieve your efficiency goals by outlining different storage tools to use, how they work and how you can save by using them. Also discover the pros and cons of storage management tools today.
Posted: 20 Oct 2011 | Published: 20 Oct 2011

IBM

E-guide: Top Tips for Today’s Archiver
sponsored by Symantec Corporation
EGUIDE: Check out this E-Guide from SearchDataBackup.com to learn how to choose a data archiving strategy and if using tape or disk is the best archiving method for your business. Also learn other archiving best practices to keep in mind.
Posted: 20 Oct 2011 | Published: 19 Oct 2011

Symantec Corporation

Recovering from a disaster: Over 40 tips and steps to take
sponsored by Dell Compellent
EGUIDE: DR plans must be flexible and scalable to address a wide range of things that can go wrong. This exclusive SearchDisasterRecovery.com E-Guide provides you with everything disaster recovery from A-Z - including over 40 tips and steps to help ensure your DR plan functions successfully.
Posted: 11 Oct 2011 | Published: 11 Oct 2011

Dell Compellent

The Future for VMware's vStorage APIs for Data Protection Looks Promising: Presentation Transcript
sponsored by HP
PRESENTATION TRANSCRIPT: Conventional, agent-based, file-level techniques for virtual machine backup could cause problems -- most notably resource contention, which could compromise the performance of all virtual machines running on an ESX or ESXi host. Read this expert presentation transcript to learn more.
Posted: 04 Oct 2011 | Published: 04 Oct 2011

HP

Disaster Recovery Planning and Network Services
sponsored by Dell Compellent
EGUIDE: In this FAQ, Carrie Higbie, global director for data center solutions at the Siemon Company, discusses the role of network services in DR planning.
Posted: 04 Oct 2011 | Published: 03 Oct 2011

Dell Compellent

Automated Tiered Storage Claims its Space in the Storage Market
sponsored by Dell Compellent
EGUIDE: This SearchStorage.com E-Guide outlines how vendors are implementing this technology, and in particular what automated tiered storage approach they’re taking for solid-state drive.
Posted: 04 Oct 2011 | Published: 03 Oct 2011

Dell Compellent
226 - 250 of 421 Matches Previous Page    8 9 10 11 12 13    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement