IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
51 - 75 of 470 Matches Previous Page  |  Next Page
Case Study: NTT Communicatiosn Delivers Object Storage to Enterprise Cloud Service
sponsored by Cloudian
WHITE PAPER: This case study highlights a telecom company's decision to replace their outdated distributed file storage system with a robust object storage platform designed for hybrid cloud infrastructures. Read on to discover the benefits this solution could provide your enterprise, including reduced acquisition costs, configurable replication, and more.
Posted: 15 Apr 2016 | Published: 31 Dec 2015

Cloudian

Future Proof your Data Storage with the Hybrid Cloud
sponsored by Equinix
WHITE PAPER: This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Equinix

Implementing Multi-Tenanted Storage for Service Providers
sponsored by Cloudian
WHITE PAPER: This white paper highlights a cost-effective, scalable storage platform for cloud storage services. Discover how this platform can enable your organization to deliver a multi-tenant hosting solution with storage provisioning and management capabilities and with the freedom of choice of using hardware that meets your customers' needs.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Cloudian

Object Storage: S3 API and Security
sponsored by Cloudian
JOURNAL ARTICLE: This brief article dives into the security features of AWS's online object storage web service, focusing on controlling access to data. Read on and discover how the security features can support your complex application integrations and enable you to deliver value-add functionality that isn't directly included in AWS.
Posted: 08 Apr 2016 | Published: 07 Mar 2016

Cloudian

Realize the value of data protection at scale
sponsored by HGST
WHITE PAPER: In this white paper, learn how to meet today's data protection with proper data management software and targeted storage systems that ensure integrity, scale and high availability. Access now to learn how you can simplify your backup strategy.
Posted: 31 Mar 2016 | Published: 01 Jan 2016

HGST

Don’t Be Duped by Deduplication
sponsored by arcserve
WEBCAST: In this comprehensive webcast, learn how to achieve 93% data reduction across 125 protected servers. Find out about the challenges and benefits you may come across when applying deduplication to your backup in this can't-miss webcast.
Posted: 11 Mar 2016 | Premiered: Feb 29, 2016

arcserve

Key Factors in Modernizing backup and Recovery
sponsored by Veritas
WHITE PAPER: This white paper summarizes the trends that have made modernizing backup and recovery an urgent priority and assesses the advantages of an appliance model. Read on to see how a backup appliance can enable fast, reliable bandwidth-efficient backups and recovery of data across your data centers, remote offices, and virtual and physical environments.
Posted: 28 Jan 2016 | Published: 31 Jul 2015

Veritas

Backup for Dummies
sponsored by Acronis
EBOOK: This e-book provides a comprehensive guide for putting data protection and disaster recovery systems in place for use cases ranging from simple file recovery to the most complex systems. Read on to learn how to manage your enterprise's data with ten tips for easier backup and recovery.
Posted: 21 Jan 2016 | Published: 31 Dec 2014

Acronis

Case Study: Richardson International
sponsored by Commvault
CASE STUDY: This case study explores Richardson International's, an agribusiness, decision to implement a software solution that could better manage and protect their virtualized corporate information. Read on to see how this software can increase your ROI by cost-efficiently protecting your data and streamlining administration.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

Commvault

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014

Imperva

Ensure Business Continuity with a Modern Disaster Recovery Approach
sponsored by Commvault
WHITE PAPER: This essential white paper discusses the need for a modern, cloud approach to disaster recovery that consists of multiple facets united on a common platform. Read on to learn how cloud can help your enterprise unify, centralize and simplify your DR operations.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Commvault

Traditional Backup Vs. Modern Data Protection
sponsored by Commvault
WHITE PAPER: In this resource, compare traditional backup versus modern data protection, and discover a holistic, single platform approach that will protect your company's vital data. Read on to examine the advantages modern data protection offers over traditional backup.
Posted: 15 Sep 2015 | Published: 15 Sep 2015

Commvault

8 Storage Tips and Tricks from Pure Storage
sponsored by Pure Storage
WHITE PAPER: This brief white paper highlights 8 tips and tricks for implementing one particular flash storage platform. Access this paper now to key into expert advice for selecting enterprise storage vendors, as well as learn why legacy storage recommendations no longer hold true for flash, and more.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Case Study: Blast Performance with Flash
sponsored by Pure Storage
WHITE PAPER: This case study showcases a company's adoption of flash storage to free up data center space previously occupied by several legacy disk arrays. Read on to find out how to improve the speed and reliability of your organization with this storage solution, as well as scale customer analytics.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015

IBM

Enterprise File Sharing Without Giving Up Control of IT Functions
sponsored by Red Hat
WHITE PAPER: Read this white paper and discover how the Red Hat Gluster Storage solution enhances workforce productivity without handing over control of IT functions to public cloud service providers.
Posted: 29 Jun 2015 | Published: 27 Feb 2015

Red Hat

The Economics of Enterprise Data Protection on Cost and Scalability
sponsored by Sempre Technologies Ltd
EGUIDE: In this e-guide, experts explore what backup admins look for during the data protection purchasing phase. Access now and learn why cost and scalability are top of mind, and what needs further consideration.
Posted: 31 Mar 2016 | Published: 28 Mar 2016

Sempre Technologies Ltd

Case Study: Global Company Simplifies Storage Administration and Flexibility
sponsored by Nimble Storage
CASE STUDY: In this case study, find out how Staples made their storage solution easy and efficient once again with flash-optimized hybrid storage. Read on to discover benefits including 30x reduction in datacenter footprint and a 9x storage cost reduction without impacting performance.
Posted: 19 Feb 2016 | Published: 19 Feb 2016

Nimble Storage

CW Europe – Forecast: Cloudy with Dry Spells
sponsored by ComputerWeekly.com
EZINE: In Europe cloud is restricted and hybrid setups make use of local compute and storage.
Posted: 09 Feb 2016 | Published: 08 Feb 2016

ComputerWeekly.com

Transform Backup to Transform Your Business
sponsored by Veritas
WHITE PAPER: This detailed white paper highlights a backup and recovery software that protects a variety of platforms, applications, and infrastructures. Discover how this software can integrate with your infrastructure to provide your enterprise with reliable, consistent data protection and keep your storage secure.
Posted: 27 Jan 2016 | Published: 31 Aug 2015

Veritas

Time for IT to Reign in Cloud Computing Control
sponsored by Microsoft
EGUIDE: Access this e-guide to see how hybrid cloud models can enable organizations to promote secure and economical storage without eliminating the freedom that users prefer. You will also learn how niche cloud computing environments are providing more targeted services and how to build a solid hybrid cloud environment.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Microsoft

An Expert Guide to Data Archiving with the Hybrid Cloud
sponsored by Microsoft
RESOURCE: In this resource, you will discuss the newest technologies used for digital archiving, and discover how the Microsoft hybrid cloud solution (HCS) can be used to archive data to Windows Azure Storage. Access this resource chapter to utilize cloud replication services that provide DR protection.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

Microsoft

The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Storage Magazine, August 2015
sponsored by SearchStorage.com
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchStorage.com

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business
51 - 75 of 470 Matches Previous Page    1 2 3 4 5 6    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement