IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage SecurityReports
76 - 100 of 469 Matches Previous Page  | Next Page
Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous
sponsored by Iron Mountain
WHITE PAPER: This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy.
Posted: 16 Jul 2013 | Published: 31 May 2013

Iron Mountain

6 Dos & Don'ts: For Data Archiving
sponsored by Iron Mountain
WHITE PAPER: This resource reveals six dos and don'ts of data archiving. Read on now to learn how you can leverage proven knowledge in order to more strategically approach your data archiving project.
Posted: 18 Jun 2013 | Published: 18 Jun 2013

Iron Mountain

The ABC's of Big Data
sponsored by NetApp
WHITE PAPER: This white paper considers the problems posed by the explosion of big data and provides a framework for evaluating new infrastructure requirements.
Posted: 13 Jun 2013 | Published: 31 Dec 2012

NetApp

Multi-Hypervisor Environments: Worth the Work?
sponsored by SearchCIO.com
EZINE: Are multi-hypervisor environments the right solution to virtualization oligarchy? Perhaps, but CIOs must also beware adding unnecessary complexities.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

SearchCIO.com

Storage Through the Looking Glass
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Legal Issues of Cloud Forensics
sponsored by Global Knowledge
WHITE PAPER: This white paper asks 5 essential questions about cloud forensics, revealing key issues a company or forensic examiner might face when collecting information from the cloud.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Global Knowledge

Virtual Machine Backup and Recovery: Five Critical Decisions
sponsored by Symantec Corporation
WHITE PAPER: This white paper analyzes 5 critical decisions organizations must make when building a backup and recovery plan and provides two crucial backup and recovery solutions, optimized for organizations with unique requirements.
Posted: 15 Mar 2013 | Published: 28 Feb 2013

Symantec Corporation

Finding a modernized data backup solution for health care
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com demonstrates how Continuous Data Protection (CDP) offers a backup and recovery approach that is well-suited to health care. Learn about the different types of CDP solutions and decide whether it's a step in the right direction for your organization.
Posted: 01 Aug 2013 | Published: 13 May 2013

HP & Intel®

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
CASE STUDY: Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
Posted: 31 Jul 2013 | Published: 31 Oct 2007

Lumension

How to Achieve Device Control Peace of Mind
sponsored by Lumension
CASE STUDY: Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Lumension

Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)
sponsored by Oracle Corporation
PODCAST: In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
Posted: 15 Jul 2013 | Premiered: Jul 15, 2013

Oracle Corporation

Hitachi Content Platform Anywhere
sponsored by Hitachi Data Systems
WEBCAST: Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.
Posted: 25 Jun 2013 | Premiered: Jun 25, 2013

Hitachi Data Systems

Generating Proven Business Value with EMC Next- Generation Back Up and Recovery
sponsored by EMC & Arrow
WHITE PAPER: This white paper explores a few next-gen backup and recovery solutions that have been easily and affordably deployed in companies across all industries.
Posted: 14 Jun 2013 | Published: 31 Oct 2011

EMC & Arrow

Storage Decisions University: Storage for Virtual Servers
sponsored by SearchVirtualStorage.com
VIRTUAL ENVIRONMENT: As server virtualization becomes increasingly prevalent, the need for effective storage management becomes even more apparent. This classroom outlines the storage challenges associated with server virtualization, concerns specific to VMware environments, and tools that prove valuable in addressing common performance and capacity issues.
Posted: 03 May 2013 | Premiered: 02 May 2013


Cloud-based archiving for e-discovery/compliance: Five "need to knows"
sponsored by Hewlett-Packard Company
EGUIDE: This expert E-Guide discusses five key questions to answer when evaluating or developing a cloud-based archiving strategy for your business.
Posted: 01 May 2013 | Published: 01 May 2013

Hewlett-Packard Company

E-Guide: Build a Hybrid Storage Cloud
sponsored by Hitachi Data Systems
EGUIDE: This expert E-Guide explores the choices that must be considered when combining public and on-premise cloud storage and provides insight into the available products and services to help you make those decisions.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

Hitachi Data Systems

2013 Virtual Server Backup Software Buyer’s Guide
sponsored by CommVault Systems, Inc.
WHITE PAPER: This buyer's guide provides a comprehensive list of virtual server backup software solutions available today and explores what features they offer in the form of detailed, standardized data sheets that can assist you in making an informed decision in regards to your backup and recovery solutions.
Posted: 29 Apr 2013 | Published: 28 Feb 2013

CommVault Systems, Inc.

Before You Renew With Your Legacy Backup Software
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explores five questions to ask when choosing a backup solution. Discover key considerations that will enable you to make a smart and informed decision.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

CommVault Systems, Inc.

Data Protection for SharePoint and Exchange: A guide for MSPs
sponsored by Kroll Ontrack, Inc.
EGUIDE: This E-Guide explores the evolution of backup functionalities in Exchange Server 2010 and offers step-by-step instructions for performing item-level recovery of SharePoint content.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Kroll Ontrack, Inc.

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment
sponsored by EMC
WHITE PAPER: This white paper reveals the benefits of virtual private cloud deployment and how one leading vendor's cloud virtualization technologies support the implementation of secure private cloud deployments of Microsoft Exchange Server and Microsoft SharePoint.
Posted: 17 Apr 2013 | Published: 28 Feb 2013

EMC

FalconStor® RecoverTrac™: Automated Service-oriented Disaster Recovery
sponsored by FalconStor Software
WHITE PAPER: This white paper explores a disaster recovery solution that gives you peace of mind by removing complexity from the equation. Read on to get a detailed account of FalconStor's RecoverTrac technology and how it can help you address a full range of disaster recovery challenges.
Posted: 16 Apr 2013 | Published: 04 Feb 2013

FalconStor Software

Infographic: Disaster Recovery Trends in 2013
sponsored by FalconStor Software
WHITE PAPER: Check out this one-page infographic that details the top trends in the realm of disaster recovery in 2013. You'll gain insight into: the current landscape, what the future holds, the importance of automated DR and more.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

FalconStor Software

Backup Transformation from the Inside
sponsored by EMC Corporation
WHITE PAPER: This white paper provides an insider's view of the need for and impact of backup transformation in today's ever-changing IT landscape.
Posted: 15 Apr 2013 | Published: 30 Nov 2012

EMC Corporation

Disaster Recovery Strategy Building
sponsored by Dell, Inc.
PRESENTATION TRANSCRIPT: In this transcript of a video by expert Jon Toigo, founder and CEO of Toigo Partners International outlines what should go into a disaster prevention strategy and why, above all, data must be protected. Also discussed - the importance of data restore time.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

Dell, Inc.
76 - 100 of 469 Matches Previous Page    2 3 4 5 6 7    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement