IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 
Definition continues below.
Storage Security Reports
76 - 100 of 412 Matches Previous Page  |  Next Page
DR Planning: Top 10 tips
sponsored by SearchStorage.com
EGUIDE: This expert E-Guide explores the top ten DR tips from John Toigo to help navigate DR planning more efficiently and shows you how to justify your DR initiatives by analyzing critical DR data.
Posted: 17 Apr 2013 | Published: 17 Apr 2013

SearchStorage.com

FAQ: Building a DR site vs. outsourcing disaster recovery
sponsored by SearchStorage.com
EGUIDE: Access this E-Guide to learn more about the thought that should go into making this decision. Read on to discover more about the importance of a good DR plan and learn: pros and cons of custom-built DR sites vs. outsourced DR, differences between hot sites, cold sites and warm sites, considerationswhen developing your own site and more.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

SearchStorage.com

Legal Issues of Cloud Forensics
sponsored by Global Knowledge
WHITE PAPER: This white paper asks 5 essential questions about cloud forensics, revealing key issues a company or forensic examiner might face when collecting information from the cloud.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Global Knowledge

Building a Hybrid Storage Cloud
sponsored by SearchStorage.com
ESSENTIAL GUIDE: Access this exclusive Essential Guide from SearchCloudStorage.com to explore hype-free, expert insight into building a hybrid storage cloud. Inside, find articles on hybrid cloud storage products, the pros and cons of hybrid clouds, and learn about the true weak spots of the hybrid cloud model.
Posted: 22 Feb 2013 | Published: 22 Feb 2013

SearchStorage.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment
sponsored by EMC
WHITE PAPER: This white paper reveals the benefits of virtual private cloud deployment and how one leading vendor's cloud virtualization technologies support the implementation of secure private cloud deployments of Microsoft Exchange Server and Microsoft SharePoint.
Posted: 17 Apr 2013 | Published: 28 Feb 2013

EMC

FalconStor® RecoverTrac™: Automated Service-oriented Disaster Recovery
sponsored by FalconStor Software
WHITE PAPER: This white paper explores a disaster recovery solution that gives you peace of mind by removing complexity from the equation. Read on to get a detailed account of FalconStor's RecoverTrac technology and how it can help you address a full range of disaster recovery challenges.
Posted: 16 Apr 2013 | Published: 04 Feb 2013

FalconStor Software

Infographic: Disaster Recovery Trends in 2013
sponsored by FalconStor Software
WHITE PAPER: Check out this one-page infographic that details the top trends in the realm of disaster recovery in 2013. You'll gain insight into: the current landscape, what the future holds, the importance of automated DR and more.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

FalconStor Software

Backup Transformation from the Inside
sponsored by EMC Corporation
WHITE PAPER: This white paper provides an insider's view of the need for and impact of backup transformation in today's ever-changing IT landscape.
Posted: 15 Apr 2013 | Published: 30 Nov 2012

EMC Corporation

Disaster Recovery Strategy Building
sponsored by Dell, Inc.
PRESENTATION TRANSCRIPT: In this transcript of a video by expert Jon Toigo, founder and CEO of Toigo Partners International outlines what should go into a disaster prevention strategy and why, above all, data must be protected. Also discussed - the importance of data restore time.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

Dell, Inc.

Clustered SAN enables seamless scaling and greater storage efficiency
sponsored by NetApp
WHITE PAPER: Storage systems today must match agility with proven, diversified I/O performance to satisfy an enterprise's changing needs. NetApp has benchmarked superior I/O performance in their FAS6240 Clustered SAN storage array, resulting in its ranking as Silverton Consulting's Enterprise OLTP Champion of Champions™ for 1Q-2013.
Posted: 14 Mar 2013 | Published: 28 Dec 2012

NetApp

8 Questions to Ask Before Moving to the Cloud
sponsored by Symantec Corporation
EGUIDE: Access this exclusive SearchCloudStorage.com E-Guide to discover eight questions you should ask before deciding if cloud storage can satisfy your company's needs and learn about considerations you must keep in mind to best determine your organization's storage primary use case.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

Symantec Corporation

FAQ: What is Health Data Archiving?
sponsored by HP & Intel®
EGUIDE: Due to the federal Health Information Portability and Accountability Act (HIPAA), health care facilities are required to save enormous amounts of patient data every year. As a result, data archiving should be a key part of every facility's IT plan. Access this eguide for a guide to selecting the right archiving approach to meet your storage needs.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

HP & Intel®

The Importance of High-Availability Systems in Disaster Recovery Plans
sponsored by Neverfail
EGUIDE: Learn why high-availability systems are integral components of disaster recovery plans in today's always-on business climate by checking out this expert SearchDisasterRecovery.com E-Guide.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

Neverfail

5 Keys to Successful VM Backup
sponsored by Quantum Corporation
EGUIDE: Check out this expert E-Guide to learn the top 5 data protection pitfalls of VMs and how to avoid them.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

Quantum Corporation

Managing the Information that Drives the Enterprise Storage: Focus on Virtual Desktops and Storage
sponsored by Dell, Inc.
EBOOK: Planning and managing storage capacity in a VDI poses unique challenges. Check out this e-book to learn VDI best practices and hear VDI success stories before getting started on your project.
Posted: 02 Jan 2013 | Published: 07 Apr 2011

Dell, Inc.

Big Data: Impact on Storage Systems, Processes and Budgets
sponsored by Cleversafe
EGUIDE: The exact definition of big data is still shaky for most, but experts agree that big data analytics and retention are impacting storage in a huge way. Explore this impact and gain insight into big data's other effects on storage processes and budgets, plus learn how vendors are responding to big data challenges in this expert E-Guide.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Cleversafe

Is cloud storage the right move for health care information?
sponsored by EMC Isilon
EGUIDE: This e-guide explores the most important considerations for health care organizations thinking about cloud data backup. Inside, uncover the steps you'll need to take when venturing into a cloud data backup plan, as well as how to prioritize your data.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

EMC Isilon

The pros and cons of health care storage systems
sponsored by EMC Isilon
EGUIDE: This e-guide breaks down the pros and cons of the major storage systems in use today and offers impartial advice on how you can find which would work best in your health care organization.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

EMC Isilon

Cloud-Based Email Archiving Pros and Cons
sponsored by Symantec Corporation
EGUIDE: Explore the benefits and downfalls of cloud-based email archiving in this expert E-Guide brought to you by SearchStorage.com. Find key criteria you shouldn't overlook when considering archiving in the cloud and learn why it's essential to know the ins and outs of whatever service in which you intend to invest.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

FAQ Guide: Data Backup & Security Pain Points
sponsored by Quantum Corporation
EGUIDE: This FAQ Guide can help you get started on the right path to securing your stored and backed up data. Access it now to find questions and answers about data encryption challenges and appliances, cloud storage security, and tape, host-based or disk encryption approaches.
Posted: 31 Oct 2012 | Published: 31 Oct 2012

Quantum Corporation

Emerging StorageTechniques in Health Care
sponsored by Asigra
EGUIDE: This essential guide on emerging storage techniques in health care demonstrates how, with a little creativity, organizations can benefit from the new cloud storage techniques that make electronic information easier to manage.
Posted: 18 Oct 2012 | Published: 18 Oct 2012

Asigra

Protecting Healthcare Data in the Cloud: GNAX Health & Intel
sponsored by Intel
WHITE PAPER: This exclusive resource demonstrates how health care facilities can protect sensitive patient data in the cloud, while preserving the server performance that users require – all while ensuring compliance with HIPAA and HITECH.
Posted: 17 Oct 2012 | Published: 17 Oct 2012

Intel

Scale-Out NAS for Unstructured Data
sponsored by Red Hat
WHITE PAPER: This white paper introduces a scale-out NAS software solution for cloud environments designed to meet unstructured data requirements and provide a high-performance, virtualized and centrally managed storage pool. Able to scale both capacity and performance, you'll be able to achieve an unprecedented price/performance ratio without compromise.
Posted: 28 Sep 2012 | Published: 14 Feb 2012

Red Hat

Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT: Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012

WatchDox
76 - 100 of 412 Matches Previous Page    2 3 4 5 6 7    Next Page
 
STORAGE SECURITY DEFINITION (continued): …  accessible to authorized people, corporations, and agencies. It must be difficult for a potential hacker to compromise the system. The network must be reliable and stable under a wide variety of environmental conditions and volumes of usage. Protection must be provided against online threats such as viruses, worms, Trojans, and other malicious code. Sensitive data should be encrypted. Unnecessary services should be disabled to minimize the number of potential security holes. Updates to the operating system, supplied by the platform vendor, should be installed on a regular basis. Redundancy, in … 
Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement