IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
26 - 50 of 469 Matches Previous Page  | Next Page
The Basics of Data Deduplication Solutions
sponsored by Dell Software
EGUIDE: This guide gives the basics of deduplication and focuses on how deduplication fits in with disaster recovery strategies. It also shows the advantages of hardware and software deduplication.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell Software

Mobile, Secure AND Cost-Efficient Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Citrix

Tape Storage Meets Long Term Data Retention Challenges
sponsored by FujiFilm
WHITE PAPER: The Tape Storage Council issued this memo to highlight the current trends, usages and technology innovations occurring within the tape storage industry.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

FujiFilm

The Truth About Tape
sponsored by FujiFilm
WHITE PAPER: This white paper gives the facts on tape and its place in the world of storage. Industry expert Jon Toigo weighs in on the continued relevance of one of the oldest computer technologies still in use today.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

FujiFilm

Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: This resource explores the role of recovery in data backup and security, and introduces a backup tool that delivers the key capabilities you need.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Rand Secure Data

Magnetic Tape to the Rescue
sponsored by FujiFilm
RESOURCE: This article gives a brief history of tape storage and highlights the benefits it still provides. As data growth grows and retention periods lengthen, tape is becoming increasingly relevant, even compared to newer technologies.
Posted: 17 Mar 2014 | Published: 30 Nov 2013

FujiFilm

Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by SearchVirtualStorage.com
EBOOK: This Buyer’s Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 14 Mar 2014 | Published: 19 Mar 2014


Accelerate and Simplify Business Growth
sponsored by Hewlett-Packard Company
BROCHURE: This brochure highlights advisory services that can help you understand the business drivers that will impact organizations in the future. It also gives the benefits that these advisory services offer, such as reduced complexity and enterprise costs and improved business processes and operational results.
Posted: 12 Mar 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

The Big Data Challenge: How To Develop a Winning Strategy
sponsored by EMC Corporation
WHITE PAPER: This brief resource breaks down Big Data in a way that's understandable and shows how adopting Big Data analytics early can be beneficial to organizations in any industry.
Posted: 11 Mar 2014 | Published: 14 Jun 2012

EMC Corporation

Five Important Questions to Ask Before You Renew With Your Legacy Backup Software Provider
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper provides 5 key questions that you need to ask to evaluate your organization's backup situation before making the critical decision. Read on for the answers that may surprise you.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

CommVault Systems, Inc.

ESG: How to Build a Strategic Archive
sponsored by CommVault Systems, Inc.
WHITE PAPER: Read this informative white paper to learn the benefits of implementing a strategic archive strategy to improve efficiency, cut costs and lower security risks while also keeping up with extreme data growth.
Posted: 05 Mar 2014 | Published: 28 Feb 2013

CommVault Systems, Inc.

Insight From The Iron Mountain Data Protection Predictors Study
sponsored by Iron Mountain
DATA SHEET: This concise data sheet reveals results from over 200 IT pros concerning data protection trends that likely will change in the next 1 to 3 years.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

Iron Mountain

Backup, Archiving, and Tape: Expert Recommendations For Improving Data Protection Efficiency
sponsored by Iron Mountain
EGUIDE: This e-guide elaborates on two recommended storage efficiency tactics and reveals other lesser known benefits they deliver. Explore common criticisms you may encounter as you leverage them and obtain expert perspectives on how they can be addressed.
Posted: 04 Mar 2014 | Published: 29 Aug 2013

Iron Mountain

Critical Need For Edge Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive.
Posted: 28 Feb 2014 | Published: 31 Jan 2012

CommVault Systems, Inc.

Balancing Cost, Risk and Complexity in Your Disaster Recovery Strategy
sponsored by CommVault Systems, Inc.
WHITE PAPER: This guide goes over the requirements for a suitable Disaster Recovery strategy and highlights the fact that traditional backup plans aren't capable of dealing with new technologies.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CommVault Systems, Inc.

Modern backup alternatives
sponsored by Dell Software
WHITE PAPER: This E-Guide talks about the need for new backup processes caused by rapidly expanding data and gives alternatives to the processes many organizations currently have in place.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Dell Software

Best Practices for Mobile Device Protection and Security
sponsored by Druva Software
EGUIDE: Explore this expert e-guide to find best practices for mobile data security, four approaches to mobile data protection and a variety of security options for CIOs.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Druva Software

Analyst Report: Application Integration
sponsored by CommVault Systems, Inc.
WHITE PAPER: Access this informative white paper to evaluate key customer requirements for protecting, managing, and accessing enterprise application data. Read on to find a simplified software platform solution for data protection and recovery.
Posted: 10 Feb 2014 | Published: 30 Sep 2013

CommVault Systems, Inc.

Protecting Data at the Edge More Effectively
sponsored by CommVault Systems, Inc.
WHITE PAPER: Access this resource to discover a platform that manages and protects all of your data, no matter where it may be in today's fluid business environment.
Posted: 07 Feb 2014 | Published: 31 Dec 2013

CommVault Systems, Inc.

Essential Data Protection and Disaster Recovery for Your Infrastructure
sponsored by Iron Mountain
DATA SHEET: Take a look at this exclusive resource to find out the key features of this vendor's backup solution, and calm your worries about implementing a successful disaster recovery solution.
Posted: 29 Jan 2014 | Published: 31 Dec 2011

Iron Mountain

Product Demonstration: Idera Server Backup
sponsored by Idera
WEBCAST: Watch this in-depth webcast to find out about the key features and benefits of this server backup, including a full demonstration.
Posted: 22 Jan 2014 | Premiered: Dec 17, 2013

Idera

Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: Explore this informative white paper to find out what is needed in a backup and restore solution to ensure that your data is safe, and how one vendor incorporates all these necessities into one, successful backup solution optimized for data security and recoverability.
Posted: 10 Mar 2014 | Published: 13 Jan 2014

Rand Secure Data

Securing Mobile Worker Data in the Age of IT Consumerization
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of consumerization and focuses on the challenges that it presents while also presenting a solution to handle those challenges.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Code42

Can File Sync and Share be Both Flexible and Enterprise-ready?
sponsored by Code42
WHITE PAPER: This white paper highlights some of the crucial aspects of enterprise-wide file sync and share and proposes a solution that meets the challenges many organziations face.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Code42

Best Practices and Tips for Data Management and Security
sponsored by Code42
EGUIDE: This expert e-guide examines the best practices, tips and considerations for optimal data storage security. Additionally, experts discuss four key data retention issues to address including access, cost, risks and productivity.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Code42
26 - 50 of 469 Matches Previous Page    1 2 3 4 5    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement