IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
51 - 75 of 459 Matches Previous Page  |  Next Page
Backup for Dummies
sponsored by Acronis
EBOOK: This e-book provides a comprehensive guide for putting data protection and disaster recovery systems in place for use cases ranging from simple file recovery to the most complex systems. Read on to learn how to manage your enterprise's data with ten tips for easier backup and recovery.
Posted: 21 Jan 2016 | Published: 31 Dec 2014

Acronis

Case Study: Richardson International
sponsored by Commvault
CASE STUDY: This case study explores Richardson International's, an agribusiness, decision to implement a software solution that could better manage and protect their virtualized corporate information. Read on to see how this software can increase your ROI by cost-efficiently protecting your data and streamlining administration.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

Commvault

Secure Cloud Application Usage: Protect the Business Against Cloud-Based Threats
sponsored by IBM
WHITE PAPER: This essential solution brief highlights a SaaS solution that integrates cloud discovery, threat intelligence and prevention, policy enforcement, identity as a service, and more into one solution. Access now to see how this solution can simplify and secure your cloud application use as well as help protect against user and cloud-based threats.
Posted: 10 Nov 2015 | Published: 30 Sep 2015

IBM

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014

Imperva

Ensure Business Continuity with a Modern Disaster Recovery Approach
sponsored by Commvault
WHITE PAPER: This essential white paper discusses the need for a modern, cloud approach to disaster recovery that consists of multiple facets united on a common platform. Read on to learn how cloud can help your enterprise unify, centralize and simplify your DR operations.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Commvault

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015

IBM

Enterprise File Sharing Without Giving Up Control of IT Functions
sponsored by Red Hat
WHITE PAPER: Read this white paper and discover how the Red Hat Gluster Storage solution enhances workforce productivity without handing over control of IT functions to public cloud service providers.
Posted: 29 Jun 2015 | Published: 27 Feb 2015

Red Hat

Growing Data, Growing Danger: How To Reduce Breaches
sponsored by Micron Technology
RESOURCE: This helpful resource details how to protect data from potential breaches using SSD. Read on to get the facts about data security, and why all companies must put data protection at the top of their priorities.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Micron Technology

The Security Benefits of Software-Defined Storage
sponsored by DataCore Software Corporation
WHITE PAPER: Access this white paper to learn about the many benefits of software-defined storage, including how it can help you prevent data loss. View now to learn more.
Posted: 05 Mar 2015 | Published: 30 Sep 2014

DataCore Software Corporation

Storage Anywhere and Everywhere: Dealing With the Challenges of Data Fragmentation
sponsored by Mimecast
WHITE PAPER: This white paper provides key findings from a research study on how organizations are meeting information-related requirements and overcoming data fragmentation and cloud storage challenges. Read on to learn how you can efficiently manage your business information with a cloud-based storage solution.
Posted: 19 Dec 2014 | Published: 30 Jun 2013

Mimecast

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper explains encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Time for IT to Reign in Cloud Computing Control
sponsored by Microsoft
EGUIDE: Access this e-guide to see how hybrid cloud models can enable organizations to promote secure and economical storage without eliminating the freedom that users prefer. You will also learn how niche cloud computing environments are providing more targeted services and how to build a solid hybrid cloud environment.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Microsoft

An Expert Guide to Data Archiving with the Hybrid Cloud
sponsored by Microsoft
RESOURCE: In this resource, you will discuss the newest technologies used for digital archiving, and discover how the Microsoft hybrid cloud solution (HCS) can be used to archive data to Windows Azure Storage. Access this resource chapter to utilize cloud replication services that provide DR protection.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

Microsoft

The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Storage Magazine, August 2015
sponsored by SearchStorage.com
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchStorage.com

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

Why Data Deduplication Should Matter to You
sponsored by HPE and Intel®
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HPE and Intel®

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Better Backup for Big Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains the challenges of modern data backup in the age of Big Data and proposes a new solution that delivers comprehensive database support, protection for data warehouse appliances, Hadoop and Big Data analytics capabilities and more.
Posted: 28 May 2014 | Published: 28 Sep 2012

Symantec Corporation

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 15 May 2014 | Published: 15 May 2014

Dell Software

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps
51 - 75 of 459 Matches Previous Page    1 2 3 4 5 6    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement