Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 6 No. 9 November 2007

Where encryption fits best

There are numerous places to embed encryption into your backup infrastructure. Considering key management and performance issues, here are our recommendations. A tarnished corporate name and possible financial and legal liabilities head the list of management concerns whenever removable disks and tape cartridges holding sensitive information are misplaced or stolen. Encryption can minimize the risks associated with these inevitable occurrences. But with multiple methods available to encrypt data and standards for the long-term management of encryption keys still in their early stages, companies need to proceed cautiously. Encryption secures data and makes it accessible only to those individuals or applications with the proper credentials. Companies may choose to encrypt data in a number of places in the backup infrastructure to satisfy specific application or corporate requirements. For example: Backup software may include an encryption function that encrypts data on the client or on a designated server before storing the data. ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Survey Says: Still coping with capacity

  • Solid-state storage finds its niche

    by  Alan Radding

    Storage managers facing critical storage performance problems and needing maximum IOPS have found a feasible option in solid-state disk. Solid-state storage is fast, cool and it barely sips power, but it's still far more expensive than traditional media.

  • Where encryption fits best

    by  Jerome Wendt

    Everybody knows they should encrypt tapes that go offsite, but many are still on the fence about where encryption should occur in their storage environments. There are a number of options, ranging from using your backup app's encryption capabilities to installing a purpose-built encryption appliance. We weigh the pros and cons of the available alternatives so that you can decide which approach best suits your shop.

Columns in this issue

  • Editorial: Web services for storage? It's already happening

    Web services for storage? It's already happening

  • Hot Spots: Web 2.0 storage: Challenges and choices

    by  Bob Laliberte

    Web 2.0 tools and strategies hold many potential benefits for businesses that deploy them, but their requirements for rapidly scalable storage and access, as well as persistent data, pose significant challenges for the IT staffs that need to build and manage the infrastructure.

  • Best Practices: Tackling data migration

    Data center projects often involve migrating data, which is frequently a painful process that can lead to unplanned downtime and outages. It's time to adopt consistent, repeatable migration practices. Selecting the right approach is highly dependent on infrastructure limitations, data and platform types, time constraints and staff capabilities.

  • Storage Bin 2.0: Virtually changing everything

    Server virtualization drives storage growth and dramatically drives the proliferation of storage networking. This is enabling the re-invention of how we manage, protect, store and access information.

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close