Access "How to build a storage security strategy for your enterprise"
This article is part of the Vol. 2 No. 5 July 2003 issue of Evaluating the benefits of IP SANs
Talk with any IT person these days and you'll hear that security concerns are on the top of their mind. Many of these folks were burned back in January by SQL Slammer, which affected 200,000 systems, did over $1 billion in damages, impacted major corporations such as Bank of America, Continental Airlines and Microsoft and ruined a lot of weekend plans. Severe problems like these lead to action. According to a Morgan Stanley survey of 225 CIOs conducted in December 2002, security spending tops their 10 highest priorities for 2003. In spite of the continued slow economy, security is one area where spending is real and sector growth is inevitable. IT departments at enterprises and midmarket companies are spending money on traditional desktop, perimeter and network security infrastructures with the top five areas being anti-spam, antivirus, intrusion-detection systems (IDS) and firewalls. What about storage? Although storage security hasn't made Morgan Stanley's top 10 list yet, there's a cottage industry of vendors addressing this space. Companies such as Decru... Access >>>
Premium Content for Free.
Close the IM Loophole
NYSE sends message about instant messages
by Jerome Wendt
Installing, configuring and maintaining Fibre Channel host bus adapters (HBAs) is the bane of many SAN administrators. Thankfully, these new cards offer better management tools.
When a Mighty Wind Blows into Town
South Floridian IT managers don't worry a whole lot about terrorism, but there's one thing they do worry about: hurricanes.
Virtual SANs put to the test
by David Braue
Cisco's new virtual SAN technology has aroused a lot of interest. But how does it work in practice? We look at how Australia's Deakin University uses VSANs to isolate development activity within its large, multisite fabric.
CAD for SANs
by John Vacca
New automated design tools can help you build the SAN of your dreams.
Drive Vendors Think Small
Seagate's incredible shrinking disk
Creating a large e-mail system
by Jim Booth
Here's how one storage team transformed a monolithic storage design into a flexible, scalable system.
- Close the IM Loophole
Roll Your Own NAS
Is building your own NAS better?
The evolving storage department
by Carol Hildebrand
Here's how to avoid common road blocks as you revolutionize your storage department.
Getting remote data right
by Marc Farley
The second of a two-part series on business continuity, this article focuses on how to use replicated data and the different types of replication: subsystem, host and network device based.
EMC Launches Space-Saving Copy Option for Symmetrix
EMC wants to save you space
SEC: No Hard and Fast Distance Minimums
SEC doesn't define distance minimums
- Serial ATA Adoption Ramping Up
IP SANs take their place
There's a growing interest in using IP for storage in small to midsized enterprises, although Fibre Channel is still dominant in large organizations. What's right for you: IP, FC or a combination of both?
- Roll Your Own NAS
How to build a storage security strategy for your enterprise
According to a Morgan Stanley December 2002 survey of 225 CIOs, security spending tops their 10 highest priorities for 2003. This article details how to build a thorough, companywide security strategy.
Intelligence belongs in the network and on the switch
Storage Bin: Intelligence belongs in the network and on the switch, but it's not going to get there in a jiffy.
Snapshot: 4Gb/s Fibre Channel Switches
Would You Buy a 4Gb/s Fibre Channel Switch?
Veritas SANPoint Control compared with EMC ControlCenter
by Darryl Brooks
In the second part of a two-part article, we review Veritas SANPoint Control and compare it with EMC ControlCenter.
Is compliance the next killer app?
by Mark Schlack
Is compliance the next killer app?
What are your backup, DR and data retention policies?
by James Damoulakis
Can you describe your backup, retention and disaster recovery policies? And do they correctly address your business needs?
- How to build a storage security strategy for your enterprise
More Premium Content Accessible For Free
Big data infrastructure and analytics are some of the hottest technology topics today, and it can sometimes seem impossible to dissect and digest all...
Mobile workers are now accessing, creating and modifying data on ultra-portable devices such as smartphones, tablets and phablets. Most companies ...
Solid-state storage is proliferating as a replacement for hard disk drives, where it offers a quick shift into the fast lane of storage processing. ...