Access "Security for your security appliances"
This article is part of the Vol. 5 No. 9 November 2006 issue of Salary survey reveals storage skills are in demand
Decru, the storage encryption company owned by Network Appliance, is using Mu Security's security analysis product to find vulnerabilities in its own security appliances. If this sounds paranoid, think again, says Jon Oltsik, senior analyst, information security at Enterprise Strategy Group, Milford, MA. "Extending the vulnerability mindset into storage is an important step toward really safeguarding sensitive data," he says. "Encryption technology has a giant target painted on it." Decru has deployed the Mu-4000 Security Analyzer to "see where hackers might be able to exploit our product," says Kevin Brown, Decru's VP of marketing. "It generates millions of permutations for how hackers might attack us. For example, is our key management system leaking information?" By using the tool, Decru hopes to catch vulnerabilities earlier in its development cycle and speed up its time to market, says Brown, adding that none of Decru's customers has reported any weakness in the product yet. Joel Schwalbe, VP of technical services at CNL Financial Group, has been using ... Access >>>
Premium Content for Free.
Big pay for storage jobs
Storage professionals report the highest average salaries in the four years that Storage magazine has conducted its Storage Salary Survey. See how industry, location, education, company size and management responsibilities can affect the size of your paycheck.
- DOE funds storage project
Apps to classify and find data
Data classification may seem like an arcane art, but a growing set of information classification and management products make sorting through your company's data easier than ever. These tools provide the foundation for litigation discovery, cost reduction, record management and retention, archiving, deduplication and usage control.
Rough going for Exchange replication
by Trina MacDonald, Trends associate editor
Replicating databases for disaster recovery isn't easy, and Microsoft Exchange is no exception.
Automate data migration
Moving seldom-accessed data from primary storage to less-costly storage not only saves money, but can also improve the performance of applications. Hierarchical storage management (HSM) software can help automate the migration of files, but HSM products vary in the way they approach the task. So it's important to identify the requirements of an HSM product before making a choice.
- Snapshot: Will you add iSCSI?
- Big pay for storage jobs
- HP unveils storage blade
Quality Awards II: Surprise Winner--BakBone NetVault is leader of the backup pack
BakBone Software Inc.'s NetVault, which ranked near the bottom in our 2005 survey, is this year's enterprise-class backup and recovery software winner. We'll tell you how BakBone pulled off this stunning turnaround.
- Survey Says: Storage grows unabated
- New frameworks give users more choices
- Security for your security appliances
Tape encryption strategies
by Jon Oltsik
Companies need to take a more strategic approach to tape encryption by building a services-based architecture that can meet today's needs and scale to accommodate future needs.
A new startup promises recordless e-mail
Storage Bin: A new startup promises recordless e-mail. Is this a stroke of genius that will reward the company with billions of Internet bucks, or is it the end of the world as we know it?
How to better connect storage to the business
by James Damoulakis
We can learn from manufacturing processes and use a supply chain to storage to better align it with strategic business goals. To implement this model, a storage services plan needs to be multidimensional and encompass performance, availability, data protection, data movement and migration, and data retention.
- Tape encryption strategies by Jon Oltsik
More Premium Content Accessible For Free
One of the biggest challenges of building a virtual server infrastructure is fine-tuning the storage that supports the virtual machines. Having ...
Cloud storage, virtualization and the growth of unstructured data have contributed to the way storage architectures are built and used. Virtual ...
While the concept of data archiving has existed for decades, archiving practices that were once considered standard are becoming inadequate. Factors ...