IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed   
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 

Storage Security definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary
Storage Security Reports
1 - 25 of 340 Matches Previous Page  |  Next Page
Daten speichern und schützen - Ihr neuer Vorteil im Wettbewerb
sponsored by Rubrik
WHITE PAPER: In diesem E-Book werden die vier Säulen einer effektiven Datensicherungs- und Storage-Strategie untersucht. Es wird zudem erklärt, wie Rubrik und NetApp gemeinsam diese Säulen bereitstellen.
Posted: 21 Jul 2021 | Published: 21 Jul 2021

Rubrik

Spotlight on Current & Emerging Ransomware Threats
sponsored by TechTarget
RESOURCE: From DearCry to Black Kingdom, our editors dig into the current ransomware threat landscape in our new e-guide with a spotlight on 3 important ransomware strains, 4 best practices for reporting attacks, and more. Simply fill out a few questions for our Secondary Storage Research Program and the e-guide is yours!
Posted: 29 May 2021 | Published: 29 May 2021

TechTarget

IT Priorities 2020: Covid-19 consolidates storage push to cloud
sponsored by ComputerWeekly.com
EGUIDE: The emphasis on home and remote working has been felt in storage and backup as in all areas of IT, with continued evolution towards the cloud and as-a-service storage and backup.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

A Computer Weekly buyer's guide to Colocation
sponsored by ComputerWeekly.com
EGUIDE: Colocation is an increasingly appealing option for data storage. In this 17-page buyer's guide, Computer Weekly looks at the constraints of migration, environmental considerations and datacentre opportunities in Africa.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

ComputerWeekly.com

The Atrociously Unfair Data Capacity Tax
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: Access this white paper to learn how 4 simple variables in StrongLink’s license structure can lead to a fairer, more cost-effective way to manage both your data and your storage resources while reducing storage and operational costs.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Fujifilm Recording Media USA, Inc.

Achieve a Ransomware-Free Future with Arcserve & Sophos
sponsored by arcserve
VIDEO: In this video, see how you can achieve a ransomware-free future with data protection from Arcserve and data security from Sophos. Access it here!
Posted: 11 Dec 2020 | Premiered: 20 Dec 2019

arcserve

Guard Your Hyperconverged Infrastructure with Integrated Cyber and Data Protection
sponsored by arcserve
DATA SHEET: Protecting virtualized environments from ransomware and data loss is more critical than ever, which makes choosing the best-fit solution for your organization’s needs a high stakes endeavor. In this data sheet, discover checklist items that are essential for your data protection and see a solution from Arcserve that checks all the right boxes.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

arcserve

IT Priorities 2020: Covid-19 consolidates storage push to cloud
sponsored by ComputerWeekly.com
EGUIDE: The emphasis on home and remote working has been felt in storage and backup as in all areas of IT, with continued evolution towards the cloud and as-a-service storage and backup.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

ComputerWeekly.com

Cloud Storage and Backup Market Rundown
sponsored by Cohesity
EGUIDE: Check out this e-guide for a comprehensive overview of some of the storage industries most fundamental topics— like replication vs. backup—to make sure you are taking advantage of everything they have to offer your organization.
Posted: 15 Jul 2020 | Published: 10 Jul 2020

Cohesity

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Jul 2020 | Published: 09 Jul 2020

ComputerWeekly.com

Backup: A Critical Security Tool as you Transition to a Fully Remote Workforce
sponsored by Barracuda
VIDEO: In this webinar presented by Stasia Hurley, Senior Product Marketing Manager for data protection at Barracuda, see why making sure your backup strategy up to date is especially important during the COVID-19-caused transition.
Posted: 12 May 2020 | Premiered: 12 May 2020

Barracuda

Machina Tools for Cloud Storage
sponsored by Ionic Security
DATA SHEET: A data security solution for multi-cloud storage should provide cross-cloud data security, automated incident responses, regulatory requirement tracking, and data security blind spot protection. Access this datasheet to explore a single interface multi-cloud solution that does all this while providing 3 key business benefits.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Ionic Security

Shedding Light on OEM Storage Support
sponsored by Service Express
WHITE PAPER: If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020


Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 15 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

How APAC firms can slay the storage management beast
sponsored by ComputerWeekly.com
EGUIDE: The data deluge and compliance requirements are shaping how Asia-Pacific firms are approaching storage management issues in the age of cloud. Read about the strategies that MinterEllison and the Rehabilitation Institute of Singapore are using to minimise storage complexity and manage data growth.
Posted: 24 Sep 2019 | Published: 25 Sep 2019

ComputerWeekly.com

CW Europe September 2019: Netherlands authorities halt datacentre construction and call for a policy rethink
sponsored by ComputerWeekly.com
EZINE: The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.
Posted: 30 Aug 2019 | Published: 12 Sep 2019

ComputerWeekly.com

Infographic: 2019 Europe IT Priorities, Storage
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we take a look at what the most popular primary and secondary storage initiatives are in 2019 as well as how much storage will be maintained on-premise across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 26 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.
Posted: 11 Feb 2019 | Published: 12 Feb 2019

ComputerWeekly.com

Containers: Making security and business sense
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

Storage performance: From fundamentals to bleeding edge
sponsored by ComputerWeekly.com
EGUIDE: In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.
Posted: 15 May 2018 | Published: 15 May 2018

ComputerWeekly.com

CW ASEAN: European data law - be aware and prepare
sponsored by ComputerWeekly.com
EZINE: Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

ComputerWeekly.com

CW ANZ: Prepare for EU data law
sponsored by ComputerWeekly.com
EZINE: Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

ComputerWeekly.com

Computer Weekly Buyer's Guide to EU General Data Protection Regulation
sponsored by ComputerWeekly.com
EBOOK: In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

ComputerWeekly.com

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage

Building the Best Backup Plan for Today's Storage Environment
sponsored by Iron Mountain
EGUIDE: In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.
Posted: 27 Sep 2017 | Published: 21 Sep 2017

Iron Mountain
1 - 25 of 340 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences