IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
51 - 75 of 473 Matches Previous Page  | Next Page
Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
TRIAL SOFTWARE: This is a free trial download for a software backup solution from Acronis that offers an array of unique features
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Acronis

Holistic Data Protection Center
sponsored by CommVault
VIRTUAL ENVIRONMENT: This rich virtual environment provides videos and a white paper discussing the vital need for optimal data management in all organizations worldwide.
Posted: 24 Feb 2014 | Premiered: 21 Feb 2014

CommVault

Modern backup alternatives
sponsored by Dell Software
WHITE PAPER: This E-Guide talks about the need for new backup processes caused by rapidly expanding data and gives alternatives to the processes many organizations currently have in place.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Dell Software

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Mazda Zooms-Zooms with Virtual Machine Backups in Half the Time
sponsored by Veeam Software
WHITE PAPER: Read this white paper to find out which backup and replication solution this well-known car manufacturing company selected to ensure their virtual data's safety.
Posted: 15 Jan 2014 | Published: 31 Jan 2011

Veeam Software

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Royse Wells of International Paper shares his enthusiasm for the latest storage management advances
sponsored by IBM
WEBCAST: TSM has developed a groundbreaking new graphical tool which allows you to predict if and when a backup is going to fail. Watch this quick 1 minute video to learn more about this tool from users who know best.
Posted: 26 Nov 2013 | Premiered: Mar 5, 2013

IBM

Storage: A critical component of cloud computing
sponsored by IBM
WEBCAST: Data growth is exploding and soon enough, organizations aren't going to be able to keep up with the infrastructure, services and administration needed to support that amount of data. Fortunately, this video highlights an agile, next-generation cloud-based storage system that can help you meet these demands.
Posted: 25 Nov 2013 | Premiered: Feb 4, 2013

IBM

A Cloud-Based Storage Management Platform for Companies of any Size
sponsored by IBM
WEBCAST: This organization wanted to bring the storage manager platform to smaller/medium sized companies. They came up with a cloud-based solution to make this complex enterprise system small business friendly.
Posted: 25 Nov 2013 | Premiered: Nov 12, 2012

IBM

Modernizing Backup for Today's Virtual Environments
sponsored by IBM
WEBCAST: There are some challenges that accompany choosing to implement application servers. To fix this problem, the organization recommends deploying a storage manager for virtual machines. m
Posted: 22 Nov 2013 | Premiered: Mar 14, 2013

IBM

Case Study: Housing Works reduces backup and restore times by more than 90 percent
sponsored by IBM
CASE STUDY: When a tape backup failed after a small electrical fire damaged a file server, 3 IT staff members had to spend more than two weeks re-inputting data - which delayed other projects. Read this case study to learn about this organization benefited from deploying an instant restore appliance.
Posted: 22 Nov 2013 | Published: 28 Jun 2012

IBM

Pay-as-you-Grow Data Protection for Small to Medium Businesses
sponsored by IBM
WHITE PAPER: There is a clearly identifiable need for today's storage administrators to refocus their approach toward a scalable data protection and recovery solution. Take a look at this white paper to learn about the data protection requirements for storage admins.
Posted: 21 Nov 2013 | Published: 28 Feb 2013

IBM

Consolidate Your Back-Up Systems to Save Money and Reduce Risks
sponsored by IBM
WHITE PAPER: When a data disaster occurs, are you confident that the right person with the right training will log into the right system, restore the right data to the right place and do it quickly? Read this white paper to learn how one company found a solution to this problem.
Posted: 21 Nov 2013 | Published: 31 Aug 2012

IBM

Case Study: OhioHealth eliminates hours of time in managing its storage environment
sponsored by IBM
CASE STUDY: OhioHealth must be able to recover and produce medical records at any point in time for medical and legal reasons. Fortunately there is a storage manager available to help OhioHealth recover data if it is needed.
Posted: 21 Nov 2013 | Published: 16 Dec 2011

IBM

Case Study: Reducing DR Costs and Complexity
sponsored by IBM
CASE STUDY: Penn State Hershey's research and patient care centers rely on a huge volume of data, ranging from files generated by its imaging modality systems to patient records. Penn State Hershey turned to IBM's XIV storage system, which delivered the performance and availability to make their disaster recovery program feasible almost overnight.
Posted: 20 Nov 2013 | Published: 29 May 2012

IBM

Protect Data in VMware-Based Environments with IBM Tivoli Solutions
sponsored by IBM
WHITE PAPER: This brief resource examines the challenges of traditional backup and storage approaches in virtual environments, and introduces a unified platform that enables your organization to meet these challenges and effectively store, analyze, manage, and protect data.
Posted: 07 Nov 2013 | Published: 31 Jul 2013

IBM

Securing Mobile Worker Data in the Age of IT Consumerization
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of consumerization and focuses on the challenges that it presents while also presenting a solution to handle those challenges.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Code42

Can File Sync and Share be Both Flexible and Enterprise-ready?
sponsored by Code42
WHITE PAPER: This white paper highlights some of the crucial aspects of enterprise-wide file sync and share and proposes a solution that meets the challenges many organziations face.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Code42

Best Practices and Tips for Data Management and Security
sponsored by Code42
EGUIDE: This expert e-guide examines the best practices, tips and considerations for optimal data storage security. Additionally, experts discuss four key data retention issues to address including access, cost, risks and productivity.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Code42

Protecting Data at the Edge More Effectively
sponsored by CommVault
WHITE PAPER: Access this resource to discover a platform that manages and protects all of your data, no matter where it may be in today's fluid business environment.
Posted: 07 Feb 2014 | Published: 31 Dec 2013

CommVault

Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM

Simply StoreIT File and Application Sharing
sponsored by Hewlett-Packard Company
WHITE PAPER: Read through this expert white paper to find out how this storage solution works to provide such superior service.
Posted: 16 Jan 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Simplify file shares: HP Simply StoreIT Solutions for File Shares
sponsored by Hewlett-Packard Company
BROCHURE: Read through this informative white paper to discover which HP storage solution is appropriate for your business needs.
Posted: 15 Jan 2014 | Published: 30 Jun 2013

Hewlett-Packard Company

Cloud Storage: Key Questions to Ask Before Implementation
sponsored by IBM
WEBCAST: Today, many enterprises are turning to cloud storage which is an elastic, pay-as-you-go storage pool. However, there are a few things you should consider before jumping into a cloud system.
Posted: 25 Nov 2013 | Premiered: Sep 22, 2011

IBM
51 - 75 of 473 Matches Previous Page    1 2 3 4 5 6    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement