Premium Content

Access "Really delete your data"

Published: 19 Oct 2012

Once data is written to magnetic media, the likelihood that it will stay written is high because magnetic traces tend to linger on disk and tape with a bewildering tenacity. That's good news if you're trying to recover the data, but it's less comforting if your goal is compliance, where the aim is to keep data for a given period of time and then destroy it beyond all recoverability. "Ever since Enron, no one wants to keep files around any more," says Diamond Lauffin, executive VP at Nexsan Technologies. This summer, the SATA array manufacturer announced a "secure storage appliance" called Assureon that digitally shreds files and data based on user-defined data disposition policies. Organizations increasingly want to delete data from their archives the minute they're legally eligible to do so. "If you physically have the data, you are required to produce it, even if its retention period has expired," says Dave DuPont, senior VP of sales and marketing at Plasmon, which makes optical media and libraries. For users who archive data to WORM optical platters, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

    • Tape library scales up and down

    • Katrina data management snafus compound chaos by Jo Maitland, News Director

      A lack of planning and IT skills leaves the Red Cross scrambling to organize data into a system for refugees to search for missing loved ones.

    • Process frameworks and storage

      Process frameworks provide guidelines for improving storage practices and procedures. But understanding the differences between process, procedure and policy is essential. Here are 10 ways to ensure a successful process framework implementation.

    • Hidden threats to data

      Inadequacies in storage governance and weaknesses in data management may pose far less-visible risks to a company's data. To mitigate these threats, you must be aware of the impact and probability of these risks to reduce or eliminate them.

    • Keep remote offices in sync

      With regulatory compliance, data protection requirements and the need to share data, remote office data can no longer be ignored. Wide-area file system products can rein in and protect remote data.

    • Better capacity forecasting

      There are two methods for devising storage capacity forecasts: quantitative and qualitative. By combining the two, you can develop practical metrics that will make more accurate forecasts.

More Premium Content Accessible For Free