Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 6 No. 7 September 2007

Stamp out NAS threats

There are numerous threats to NAS data and many different ways to protect it. The trick is to find the right level of protection for the perceived risk. NAS is vulnerable to many of the exploits that plague Windows-based systems: viruses, worms, unauthorized access, data tampering, snooping and IP spoofing. But even though NAS runs on ubiquitous Ethernet and TCP/IP transport protocols, it's fairly easy to protect. The tough part is finding the right level of protection. Any good security framework contains multiple security layers. If one layer is compromised, the target of the attack is still protected by other layers. In the case of NAS, network perimeter security is the outermost shield that keeps unauthorized people out of your LAN and storage network. If an attacker penetrates your perimeter security, authentication and file-access authorization will prevent access to files and folders on the NAS; and unless an attacker can guess an authorized account and its password, your data will still be protected. Prioritization and ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Fast CAS facts

  • Backup and archiving get closer together

  • How SANs aid backup

    by  Bradley Hughey

    The primary motivation for building a SAN is often to meet a pressing need for performance, scalability or both. But today's new SAN buyers are looking for more than performance and scalability; they're interested in better ways of protecting their data, using such techniques as snapshots of SAN volumes and sometimes even relying on newer technologies to replace traditional backups.

  • Protect Exchange data

    by  Jerome Wendt

    Email is now firmly established as a critical application, with more than 60% of enterprises using Microsoft Exchange for their corporate email, according to Gartner. This widespread adoption of Microsoft Exchange, and growing electronic discovery requirements, make protecting it a more complicated proposition than just performing simple backups and recoveries.

  • New role for tape libraries

    by  Jerome Wendt

    Tape libraries are finally assuming the role they were designed for: longterm protection and preservation of data. But as disk assumes its new role as the initial target for backups and the source for restores, tape library vendors need to shore up their abilities to interact with disk libraries and provide users with some definitive answers on encryption.

  • Understanding dedupe ratios

    by  Jerome Wendt

Columns in this issue

  • Editorial: Backing up garbage

  • Storage Bin: Who ate the backup?

    It's astounding that in this age of technological advancements we still talk about things like backup, let alone agonize over it.

  • Best Practices: Sorting out remote-office backup

    Remote-office data has always been something of a corporate orphan when it came to backup. Once upon a time, "out of sight, out of mind" might have worked, but times have changed. Regulatory compliance, legal liability issues and the cost of producing data for ediscovery make it clear remote data can no longer be ignored.

  • Best Practices: Pull the plug on high energy costs

    by  Dianne McAdam

    Spiraling energy costs are taking an increasingly big chunk of the data center budget. Data centers are grappling with rising electrical bills and, in some locations, limitations on the amount of available power are forcing IT anagers to rethink their basic processes.

  • Hot Spots: Managing storage in a virtual server world

    Server virtualization is the big data center story, and storage managers need to design their storage systems to take advantage of a virtualized server environment. There are steps you can take now to ensure that your storage systems are up to the task.

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close