Premium Content

Access "New storage standards from The Trusted Computing Group"

Published: 20 Oct 2012

The promise of painless storage security New specs from a standards group could bring easy-to-manage, built-in security to storage devices. Lately, it seems like the whole world has been drawn into information security. Whether it's consumers, government agencies or technology vendors, everyone now realizes that information security is the price we pay for pervasive global communications. Storage professionals and vendors are part of this mix, but a quandary exists. Storage devices are at the back of the technology stack, relatively blind to the software logic above. Protecting storage devices is a worthy goal, but what users truly want are information safeguards, not just spinning disks and magnetic media. Leading storage vendors have noticed this trend and are preparing strategies for information-centric security, a concept similar to secure information lifecycle management (ILM). The goal is to classify data based on business rules; protect data based on value; and enforce security, privacy and usage policies regardless of information location. Secure ILM... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free