Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 9 November 2006

Tape encryption strategies

The time has come for enterprise tape encryption Point solutions for encryption might work now, but can they scale to meet future needs? Backup vendors supported encryption in their products for years, but few customers ever bothered with this type of protection in the past. Why? IT managers always assumed that tape-based data was relatively safe: Tapes were used by IT professionals and tape devices sat behind vulnerable IP networks. Encryption was also eschewed because it could lead to slower performance, additional IT operational chores and higher capital costs. But times have changed. Interest in tape encryption is growing rapidly due to the following: Increasing privacy regulations. Tape-based private data has long been subjected to well-established global privacy laws like the Japanese Bill to Protect Personal Data (2001) and the EU Directive on Privacy and Electronic Communications (2002). In 2005, 13 disparate bills were introduced in the U.S. Congress; and at the beginning of 2006, 23 states had privacy regulations in ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Rough going for Exchange replication

    by  Trina MacDonald, Trends associate editor

    Replicating databases for disaster recovery isn't easy, and Microsoft Exchange is no exception.

  • New frameworks give users more choices

  • Automate data migration

    Moving seldom-accessed data from primary storage to less-costly storage not only saves money, but can also improve the performance of applications. Hierarchical storage management (HSM) software can help automate the migration of files, but HSM products vary in the way they approach the task. So it's important to identify the requirements of an HSM product before making a choice.

Columns in this issue

  • Tape encryption strategies

    by  Jon Oltsik

    Companies need to take a more strategic approach to tape encryption by building a services-based architecture that can meet today's needs and scale to accommodate future needs.

  • A new startup promises recordless e-mail

    Storage Bin: A new startup promises recordless e-mail. Is this a stroke of genius that will reward the company with billions of Internet bucks, or is it the end of the world as we know it?

  • How to better connect storage to the business

    We can learn from manufacturing processes and use a supply chain to storage to better align it with strategic business goals. To implement this model, a storage services plan needs to be multidimensional and encompass performance, availability, data protection, data movement and migration, and data retention.

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close