How does the following work?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
These are a mix of technologies and products.
Passwords provide authentication (prove an identity who or what it is).
Encryption provides confidentiality (scramble the information so no unauthorized party can steal it).
A firewall is typically a product (software, hardware or both) that is located at the periphery of a company's network to attach to the Internet. Firewalls use filtering and other techniques (including passwords) to ensure that only authorized traffic gets into the customer network.
Editor's note: Do you agree with this expert's response? If you have more to share, post it in one of our .bphAaR2qhqA^0@/searchstorage>discussion forums.
Related Q&A from Vijay Ahuja
Security expert Vijay Ahuja outlines the top five security questions to ask storage vendors before making a purchase.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.