Access "Storage security policies for data backups and tape"
This article is part of the Vol. 4 No. 2 April 2005 issue of How to scale up with storage clusters
When I joined the Enterprise Strategy Group (ESG) in 2003 to begin an information security practice, the company decided that a good place to start was at the intersection between security and storage. ESG was well known in the storage community, so why not become the voice of storage security? We discovered a few things very quickly. First, storage technology is extremely insecure from top to bottom. Whether you're talking about Fibre Channel, admin tools, switch configuration or management interfaces, security holes are rampant. These problems exist even in large data centers at Fortune 500 firms with detailed security policies, meticulous procedures and dedicated staff. It's not hard to imagine how much worse these problems are at the departmental level, in remote offices or in smaller businesses. Discovering the overall poor state of storage security was accompanied by another epiphany: Storage folks don't pay much attention to security. This startling realization applies to IT storage professionals and vendors. Let me provide a few data points to ... Access >>>
Premium Content for Free.
- Survey says: What's hot, what's not
NAS news: Boom continues
2004 numbers in: NAS still hot
Disk finally outruns tape
Mainframe shops weaning themselves off tape
Pros and cons of VTLs
by W. Curtis Preston
VTLs aren't perfect, and this tip outlines some caveats about the technology that you need to know before implementing a VTL.
Are SATA drives ready for the enterprise?
SATA drives are great low-cost alternatives to pricey Fibre Channel and SCSI drives, but they lack the reliability and performance that mission-critical applications demand. But new technologies are bringing SATA up to enterprise-class standards.
Chart a course for consolidation
by Bill Peldzus
This tip addresses key issues that must be addressed to have a successful storage consolidation project.
Keep track of backups
Backup reporting tools help track backup failures and determine their cause. Some tools can identify weak links in your backup processes where there's a potential for failure.
The new shape of SRM
Monolithic SRM apps fading away
- SAS--Hurry up and wait
Clustered servers have become a mainstay of the data center, and now clustering is quickly becoming the preferred technology for making storage more scalable, reliable and easier to manage.
First Look: Crossroads Systems' DataMover 240f
Crossroads Systems' DataMover 240f is a SAN edge device that takes on one of the most vexing backup bottlenecks by keeping data flowing through the network pipes.
Should you archive spam?
Spam gobbles up storage
- SNIA + CDP = SIG
- The new shape of SRM
Tap into Windows' hidden resources to make it enterprise-worthy
Windows often gets a bad rap when it comes to storage, but you can tap into Windows' hidden resources to make it more enterprise-worthy.
Storage Bin: The devil is in the details
"Close" isn't good enough for disaster recovery and security planning. Overlooking what might seem to be a minor detail could result in major consequences.
Storage security policies for data backups and tape
If you think host security is more than adequate to protect your storage, think again. Your backup and tape rotation practices could be putting your data at risk.
Snapshot: Remote office storage management
How do you manage remote office storage?
Signs of progress
Signs of progress
- Tap into Windows' hidden resources to make it enterprise-worthy
More Premium Content Accessible For Free
Just about as quickly as we learn the merits of a new solid-state form factor, a new one appears. While the use and location of spinning disk ...
As much as we might want to assume an "out of sight, out of mind" attitude about the data we ship to cloud storage services, the truth is that it ...
Object storage is sizzling hot, with technologists calling it the necessary building block for efficient cloud storage and big data projects. As ...