IT Management  >   Systems Operations  >   Security  >  

Storage Security

RSS Feed   
ALSO CALLED: Tape Security, Storage Encryption, Data Storage Security, Storage, Secure Data Storage, Disk Security
DEFINITION: Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. These parameters can apply to hardware, programming, communications protocols, and organizational policy. Several issues are important when considering a security method for a storage area network (SAN). The network must be easily  … 

Storage Security definition sponsored by, powered by an online computer dictionary
Storage Security Reports
1 - 25 of 480 Matches Previous Page  |  Next Page
6 Reasons Cloud Storage is Now as Secure as Traditional Data Center Storage
sponsored by Nasuni
EBOOK: Read the e-book to find 6 reasons why worrying about the security of your data in the cloud is an outdated way of thinking, and why today's cloud storage is as secure as a traditional data center.
Posted: 12 Mar 2018 | Published: 12 Mar 2018


Data Sharing vs. Data Security: Not an 'either-or' Proposition
sponsored by Merge, an IBM Company
WHITE PAPER: With healthcare organizations frequently passing imaging data back and forth, they become more susceptible to a variety of threats and need to secure the data in the right VNA without limiting access.
Posted: 06 Mar 2018 | Published: 01 Feb 2018

Merge, an IBM Company

How Continuous Data Protection can Improve Ransomware Recovery
sponsored by DataCore Software Corporation
RESOURCE: In this resource, learn why continuous data protection (CDP) might be the best way for you to make recovering from ransomware fast and effective.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

DataCore Software Corporation

Riverside Healthcare Speeds Access to Medical Images with All-flash HPE 3PAR
sponsored by Hewlett Packard Enterprise
CASE STUDY: Download this compact case study to see All-flash HPE 3PAR storage in action, with its ability to accelerate the archiving retrieval process, ensure high performance and availability of critical services in your organization, and more.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

Hewlett Packard Enterprise

CW ASEAN – February 2018: European data law: be aware and prepare
sponsored by
EZINE: Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

CW ANZ – February 2018: Prepare for EU data law
sponsored by
EZINE: Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Why Spectrum Data Protection Portfolio from IBM Is a 'Must See'
sponsored by IBM
RESEARCH CONTENT: In this ESG Research Report, learn how IBM Spectrum Protect is promising to take the next step in data protection by providing copy data management, implementing a SLA-centric framework for ensuring protection and agile recovery of highly virtualized environments and more.
Posted: 07 Feb 2018 | Published: 31 Oct 2017


Cybersecurity: The New Metrics
sponsored by BitSight
WHITE PAPER: Inside, discover a Q&A with security experts on how to enhance insight into your organization's security posture, and how traditional security metrics are changing to get a fuller picture of today's increasingly complex cybersecurity landscape.
Posted: 07 Feb 2018 | Published: 07 Feb 2018


Computer Weekly Buyer's Guide to EU General Data Protection Regulation
sponsored by
EBOOK: In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Solving Tomorrow's Data Backup and Availability Issues Today
sponsored by IBM
WEBCAST: What if a data protection and recovery product was available that was both focused on virtualized data security, and was easy to use as well? Watch this webcast to learn the capabilities of IBM Spectrum Protect Plus, and see for yourself if it fits these criteria.
Posted: 06 Feb 2018 | Premiered: Feb 6, 2018


Henry Mayo Newhall Hospital Case Study
sponsored by IBM
CASE STUDY: Read this case study to learn why they chose VersaStack, a pre- integrated infrastructure solution that combines IBM storage and Cisco server, networking and software components, as well as what they gained from this partnership.
Posted: 06 Feb 2018 | Published: 31 Dec 2016


Gordon College Case Study
sponsored by Reduxio
CASE STUDY: In this case study learn why Gordon College adopted Reduxio's HX550 hybrid flash array to accomplish their goals of app consolidation, reduced database latency, and more.
Posted: 04 Dec 2017 | Published: 04 Dec 2017


Create More than 55x Faster Hybrid Cloud Solutions with Maximum Security, Availability and Elasticity
sponsored by Digital Realty
WHITE PAPER: Download this white paper to discover technology designed to deliver maximum storage and compute capacity for enterprises, with massive data stores, that need to solve business problems fast without compromising the security of user information.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Digital Realty

Affordable, Secure and Compliant Data Storage for Law Enforcement Agencies
sponsored by Wasabi
WHITE PAPER: Read this white paper to learn why many departments are adopting object-based public cloud storage to give them the capacity and security they so desperately need in today's virtual environments that require data durability, encryption, and more.
Posted: 24 Oct 2017 | Published: 24 Oct 2017


Data Immutability Provides Ultimate Protection
sponsored by Wasabi
WHITE PAPER: This white paper explores a universal cloud object storage service that protects against accidental or malicious data destruction, so you can avoid data erasure, combat ransomware and viruses, and more.
Posted: 23 Oct 2017 | Published: 23 Oct 2017


10 Simple Tips to Protect Yourself from Ransomware
sponsored by Acronis
WHITE PAPER: Inside, learn 10 tips as to how you can optimize your backup system to help defend against the ransomware threat
Posted: 12 Sep 2017 | Published: 12 Sep 2017


Transforming Data Protection with Blockchain Tech, Ransomware Protection, and Quick Insights
sponsored by Acronis
WHITE PAPER: Today's infrastructure needs a holistic data protection suite compatible with all workloads in all environments. This IDC report outlines one such offering, which provides a blockchain-based authentication and integrity tool for automated, proactive protection from ransomware, and more.
Posted: 07 Sep 2017 | Published: 11 Sep 2017


How to Secure Your Microsoft Office 365 Environment
sponsored by AWS-Netapp
WHITE PAPER: Is your Office 365 environment leaving you exposed to accidental deletion, corruption, or theft of your data? Discover how you can safeguard your environment with Cloud Control, a comprehensive data protection solution that uses AWS cloud as your backup storage target.
Posted: 29 Aug 2017 | Published: 22 Aug 2017


Ransomware Recovery Cases: Rebounding After an Attack and the Value of Data Backups
sponsored by Commvault
EGUIDE: In this expert guide, learn how to verify the integrity of your backups in order to thwart, and recover from, potential ransomware attacks. Inside, our writers provide 4 case studies of organizations that were hit then executed a successful ransomware recovery, as well as vendors fighting on the front line of the outbreak.
Posted: 23 Aug 2017 | Published: 22 Aug 2017


Reimagining Legacy Information Management and Protection
sponsored by StorageCraft Technology Corporation
WEBCAST: Inside, explore a scale-out NAS system with a unique scale-out architecture that can seamlessly integrate with your existing virtual environments. Learn how you can add up to 96 TBs of raw capacity in minutes, gain continuous data protection, and more.
Posted: 22 Aug 2017 | Premiered: Jun 30, 2017

StorageCraft Technology Corporation

Scale-out Storage Single Platform for Primary and Secondary Storage
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Learn how you can simplify storage management inside. By reading on, you'll discover how the partnership between a scale-out storage server and a distributed object-based file system can provide you with universal data access for both hot and cold storage.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

StorageCraft Technology Corporation

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018


Protect Your Data from Malicious Ransomware Threats
sponsored by Veeam Software
WHITE PAPER: Don't find yourself forced to pay for a simple oversight. Use this white paper as your guide to creating a rock-solid data availability plan by making backup images invisible, frequently testing your environment, and more.
Posted: 20 Nov 2017 | Published: 31 Jan 2017

Veeam Software

Case Study: Virtual StrongBox Expands Canadian Footprint
sponsored by TeraGo Networks
VIDEO: In this case study, Virtual StrongBox needed to expand their business into Canada. Learn how they were able to utilize a cloud service that provided a secure infrastructure, data sovereignty, enabled simultaneous backups, and more.
Posted: 03 Oct 2017 | Premiered: 31 Oct 2016

TeraGo Networks

Building the Best Backup Plan for Today's Storage Environment
sponsored by Iron Mountain
EGUIDE: In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.
Posted: 27 Sep 2017 | Published: 21 Sep 2017

Iron Mountain
1 - 25 of 480 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement