PRO+ Premium Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 6 No. 7 September 2007

Stamp out NAS threats

There are numerous threats to NAS data and many different ways to protect it. The trick is to find the right level of protection for the perceived risk. NAS is vulnerable to many of the exploits that plague Windows-based systems: viruses, worms, unauthorized access, data tampering, snooping and IP spoofing. But even though NAS runs on ubiquitous Ethernet and TCP/IP transport protocols, it's fairly easy to protect. The tough part is finding the right level of protection. Any good security framework contains multiple security layers. If one layer is compromised, the target of the attack is still protected by other layers. In the case of NAS, network perimeter security is the outermost shield that keeps unauthorized people out of your LAN and storage network. If an attacker penetrates your perimeter security, authentication and file-access authorization will prevent access to files and folders on the NAS; and unless an attacker can guess an authorized account and its password, your data will still be protected. Prioritization and ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Fast CAS facts

  • Backup and archiving get closer together

  • How SANs aid backup

    by  Bradley Hughey

    The primary motivation for building a SAN is often to meet a pressing need for performance, scalability or both. But today's new SAN buyers are looking for more than performance and scalability; they're interested in better ways of protecting their data, using such techniques as snapshots of SAN volumes and sometimes even relying on newer technologies to replace traditional backups.

  • Protect Exchange data

    by  Jerome Wendt

    Email is now firmly established as a critical application, with more than 60% of enterprises using Microsoft Exchange for their corporate email, according to Gartner. This widespread adoption of Microsoft Exchange, and growing electronic discovery requirements, make protecting it a more complicated proposition than just performing simple backups and recoveries.

  • New role for tape libraries

    by  Jerome Wendt

    Tape libraries are finally assuming the role they were designed for: longterm protection and preservation of data. But as disk assumes its new role as the initial target for backups and the source for restores, tape library vendors need to shore up their abilities to interact with disk libraries and provide users with some definitive answers on encryption.

  • Understanding dedupe ratios

    by  Jerome Wendt

Columns in this issue

  • Editorial: Backing up garbage

  • Storage Bin: Who ate the backup?

    It's astounding that in this age of technological advancements we still talk about things like backup, let alone agonize over it.

  • Best Practices: Sorting out remote-office backup

    Remote-office data has always been something of a corporate orphan when it came to backup. Once upon a time, "out of sight, out of mind" might have worked, but times have changed. Regulatory compliance, legal liability issues and the cost of producing data for ediscovery make it clear remote data can no longer be ignored.

  • Best Practices: Pull the plug on high energy costs

    by  Dianne McAdam

    Spiraling energy costs are taking an increasingly big chunk of the data center budget. Data centers are grappling with rising electrical bills and, in some locations, limitations on the amount of available power are forcing IT anagers to rethink their basic processes.

  • Hot Spots: Managing storage in a virtual server world

    Server virtualization is the big data center story, and storage managers need to design their storage systems to take advantage of a virtualized server environment. There are steps you can take now to ensure that your storage systems are up to the task.

SearchSolidStateStorage

  • Tintri VMstore T5000

    Like all of its VM-aware storage systems, Tintri’s first all-flash array -- the Tintri VMstore T5000 -- allows admins to bypass ...

  • SolidFire SF9605

    The high-capacity SolidFire SF9605 uses SolidFire’s Element OS 8 (Oxygen) to deliver new enterprise features such as synchronous ...

  • HPE 3PAR StoreServ 20850

    HPE 3PAR StoreServ 20850 holds 1,024 solid-state drives (SSDs). Hewlett Packard Enterprise claims it can deliver more than three ...

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

  • Asigra Cloud Backup Version 13

    Asigra Cloud Backup Version 13 provides an AWS Elastic Block Store Snapshot Manager and the ability to support Docker container ...

  • Veeam Availability Suite v8

    Veeam Availability Suite v8 offers several key backup software components in one package, including Veeam Cloud Connect, Snapshot...

  • Druva inSync 5.5

    Druva inSync 5.5 endpoint backup software stands out with its proactive compliance, cloud app integration, full text search and ...

-ADS BY GOOGLE

Close