Premium Content

Access "Getting serious about data storage security"

Published: 19 Oct 2012

For years, storage professionals measured their technology using two criteria: performance and availability. Storage pros may have paid lip service to security, but they often viewed it as an afterthought. These attitudes were illustrated in "Storage Security Perspectives," a July 2004 Enterprise Strategy Group (ESG) research study that surveyed 388 storage and 128 security professionals. The data pointed to a consistent pattern of user and vendor storage security indifference, such as: Thirty percent of storage professionals admitted their security policies and procedures don't encompass data storage technologies such as storage arrays, SAN switches and storage management software. Twenty-seven percent of users had experienced a storage security breach, didn't know if they'd experienced a storage security breach or couldn't tell if they'd experienced a storage security breach. In spite of the risks associated with offsite transportation and storing critical backup data, only 7% of organizations claim they "always" encrypt data as it's backed up to tape. At ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

    • Tape library scales up and down

    • Katrina data management snafus compound chaos by Jo Maitland, News Director

      A lack of planning and IT skills leaves the Red Cross scrambling to organize data into a system for refugees to search for missing loved ones.

    • Process frameworks and storage

      Process frameworks provide guidelines for improving storage practices and procedures. But understanding the differences between process, procedure and policy is essential. Here are 10 ways to ensure a successful process framework implementation.

    • Hidden threats to data

      Inadequacies in storage governance and weaknesses in data management may pose far less-visible risks to a company's data. To mitigate these threats, you must be aware of the impact and probability of these risks to reduce or eliminate them.

    • Keep remote offices in sync

      With regulatory compliance, data protection requirements and the need to share data, remote office data can no longer be ignored. Wide-area file system products can rein in and protect remote data.

    • Better capacity forecasting

      There are two methods for devising storage capacity forecasts: quantitative and qualitative. By combining the two, you can develop practical metrics that will make more accurate forecasts.

More Premium Content Accessible For Free