Premium Content

Access "Stamp out NAS threats"

Published: 20 Oct 2012

There are numerous threats to NAS data and many different ways to protect it. The trick is to find the right level of protection for the perceived risk. NAS is vulnerable to many of the exploits that plague Windows-based systems: viruses, worms, unauthorized access, data tampering, snooping and IP spoofing. But even though NAS runs on ubiquitous Ethernet and TCP/IP transport protocols, it's fairly easy to protect. The tough part is finding the right level of protection. Any good security framework contains multiple security layers. If one layer is compromised, the target of the attack is still protected by other layers. In the case of NAS, network perimeter security is the outermost shield that keeps unauthorized people out of your LAN and storage network. If an attacker penetrates your perimeter security, authentication and file-access authorization will prevent access to files and folders on the NAS; and unless an attacker can guess an authorized account and its password, your data will still be protected. Prioritization and fortification of those areas ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
  • Columns
    • Editorial: Backing up garbage

    • Storage Bin: Who ate the backup?

      It's astounding that in this age of technological advancements we still talk about things like backup, let alone agonize over it.

    • Best Practices: Sorting out remote-office backup

      Remote-office data has always been something of a corporate orphan when it came to backup. Once upon a time, "out of sight, out of mind" might have worked, but times have changed. Regulatory compliance, legal liability issues and the cost of producing data for ediscovery make it clear remote data can no longer be ignored.

    • Hot Spots: VMware opens door for next-gen backup apps by Lauren Whitehouse

      Virtualizing servers is becoming standard operating procedure in large and small companies. VMware and similar platforms are transforming data center management through server consolidation and business continuity improvements, but they're "breaking" a few things along the way, including data protection strategies.

    • Storage Bin: Shining the green spotlight on storage

      There's been a lot of hubbub lately about the greening of IT, and it's only going to get worse. Unlike most buzz/noise fronts that come and go, this one didn't start in the marketing department.

    • Editorial: Scramble that data!

    • Best Practices: Pull the plug on high energy costs by Dianne McAdam, Data Mobility Group

      Spiraling energy costs are taking an increasingly big chunk of the data center budget. Data centers are grappling with rising electrical bills and, in some locations, limitations on the amount of available power are forcing IT anagers to rethink their basic processes.

    • Hot Spots: Managing storage in a virtual server world

      Server virtualization is the big data center story, and storage managers need to design their storage systems to take advantage of a virtualized server environment. There are steps you can take now to ensure that your storage systems are up to the task.

More Premium Content Accessible For Free