IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
51 - 75 of 494 Matches Previous Page  | Next Page
Buyer's checklist: Purpose-built storage for virtual servers
sponsored by SearchVirtualStorage.com
EBOOK: This Buyer’s Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 14 Mar 2014 | Published: 19 Mar 2014


Five Important Questions to Ask Before You Renew With Your Legacy Backup Software Provider
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: This white paper provides 5 key questions that you need to ask to evaluate your organization's backup situation before making the critical decision. Read on for the answers that may surprise you.
Posted: 10 Mar 2014 | Premiered: 10 Mar 2014

CommVault Systems, Inc.

PST Archiving: What is it and How is it Done?
sponsored by CommVault Systems, Inc.
WEBCAST: This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files.
Posted: 06 Mar 2014 | Premiered: Jan 23, 2014

CommVault Systems, Inc.

ESG: How to Build a Strategic Archive
sponsored by CommVault Systems, Inc.
WHITE PAPER: Read this informative white paper to learn the benefits of implementing a strategic archive strategy to improve efficiency, cut costs and lower security risks while also keeping up with extreme data growth.
Posted: 05 Mar 2014 | Published: 28 Feb 2013

CommVault Systems, Inc.

Insight From The Iron Mountain Data Protection Predictors Study
sponsored by Iron Mountain
DATA SHEET: This concise data sheet reveals results from over 200 IT pros concerning data protection trends that likely will change in the next 1 to 3 years.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

Iron Mountain

Critical Need For Edge Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive.
Posted: 28 Feb 2014 | Published: 31 Jan 2012

CommVault Systems, Inc.

Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
TRIAL SOFTWARE: This is a free trial download for a software backup solution from Acronis that offers an array of unique features
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Acronis

Holistic Data Protection Center
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: This rich virtual environment provides videos and a white paper discussing the vital need for optimal data management in all organizations worldwide.
Posted: 24 Feb 2014 | Premiered: 21 Feb 2014

CommVault Systems, Inc.

Modern backup alternatives
sponsored by Dell Software
WHITE PAPER: This E-Guide talks about the need for new backup processes caused by rapidly expanding data and gives alternatives to the processes many organizations currently have in place.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Dell Software

How to Pick the Right Virtual Machine Protection for Your Organization
sponsored by Vision Solutions
WHITE PAPER: This white paper gives an indepth look at some of the various facets of virtual machine protection. It explains the difference between real-time vs. periodic protection, availability vs. recovery, agent-based vs. agentless solutions, storage level replication considerations and VM performance considerations.
Posted: 18 Feb 2014 | Published: 31 Dec 2013

Vision Solutions

Best Practices for Mobile Device Protection and Security
sponsored by Druva Software
EGUIDE: Explore this expert e-guide to find best practices for mobile data security, four approaches to mobile data protection and a variety of security options for CIOs.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Druva Software

Analyst Report: Application Integration
sponsored by CommVault Systems, Inc.
WHITE PAPER: Access this informative white paper to evaluate key customer requirements for protecting, managing, and accessing enterprise application data. Read on to find a simplified software platform solution for data protection and recovery.
Posted: 10 Feb 2014 | Published: 30 Sep 2013

CommVault Systems, Inc.

Protecting Data at the Edge More Effectively
sponsored by CommVault Systems, Inc.
WHITE PAPER: Access this resource to discover a platform that manages and protects all of your data, no matter where it may be in today's fluid business environment.
Posted: 07 Feb 2014 | Published: 31 Dec 2013

CommVault Systems, Inc.

Essential Data Protection and Disaster Recovery for Your Infrastructure
sponsored by Iron Mountain
DATA SHEET: Take a look at this exclusive resource to find out the key features of this vendor's backup solution, and calm your worries about implementing a successful disaster recovery solution.
Posted: 29 Jan 2014 | Published: 31 Dec 2011

Iron Mountain

Blackout Tracker
sponsored by Eaton Corporation
ASSESSMENT TOOL: This blackout tracker assessment tool helps to educate you on the causes and impact of power outages in different states and regions of the US. Find out now whether your data center is vulnerable to the next blackout.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Eaton Corporation

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Mazda Zooms-Zooms with Virtual Machine Backups in Half the Time
sponsored by Veeam Software
WHITE PAPER: Read this white paper to find out which backup and replication solution this well-known car manufacturing company selected to ensure their virtual data's safety.
Posted: 15 Jan 2014 | Published: 31 Jan 2011

Veeam Software

The Big Data Challenge: How To Develop a Winning Strategy
sponsored by EMC Corporation
WHITE PAPER: This brief resource breaks down Big Data in a way that's understandable and shows how adopting Big Data analytics early can be beneficial to organizations in any industry.
Posted: 11 Mar 2014 | Published: 14 Jun 2012

EMC Corporation

Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: Explore this informative white paper to find out what is needed in a backup and restore solution to ensure that your data is safe, and how one vendor incorporates all these necessities into one, successful backup solution optimized for data security and recoverability.
Posted: 10 Mar 2014 | Published: 13 Jan 2014

Rand Secure Data

Securing Mobile Worker Data in the Age of IT Consumerization
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of consumerization and focuses on the challenges that it presents while also presenting a solution to handle those challenges.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Code42

Can File Sync and Share be Both Flexible and Enterprise-ready?
sponsored by Code42
WHITE PAPER: This white paper highlights some of the crucial aspects of enterprise-wide file sync and share and proposes a solution that meets the challenges many organziations face.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Code42

Best Practices and Tips for Data Management and Security
sponsored by Code42
EGUIDE: This expert e-guide examines the best practices, tips and considerations for optimal data storage security. Additionally, experts discuss four key data retention issues to address including access, cost, risks and productivity.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Code42

Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM

Simply StoreIT File and Application Sharing
sponsored by Hewlett-Packard Company
WHITE PAPER: Read through this expert white paper to find out how this storage solution works to provide such superior service.
Posted: 16 Jan 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Simplify file shares: HP Simply StoreIT Solutions for File Shares
sponsored by Hewlett-Packard Company
BROCHURE: Read through this informative white paper to discover which HP storage solution is appropriate for your business needs.
Posted: 15 Jan 2014 | Published: 30 Jun 2013

Hewlett-Packard Company
51 - 75 of 494 Matches Previous Page    1 2 3 4 5 6    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement