Premium Content

Access "Disk encryption: not just for paranoids"

Published: 17 Oct 2012

As direct-attached storage (DAS) moves to storage area networks (SANs), a question asked more often of storage administrators these days is: "How safe is our data?" The question is being asked for a couple of reasons. First, attaching storage to networks introduces security vulnerabilities that didn't exist in the DAS era. And companies are increasingly facing regulations requiring that they take extra steps to keep sensitive customer information private. The risk associated with sending backup data over an unprotected IP network is obvious. But even an isolated SAN is vulnerable to attack. Many switches, host bus adapters (HBAs) and other fabric elements use management console interfaces that rely on out-of-band connections that are only minimally protected. "The management interfaces are the first security vulnerability in a SAN fabric that people should look at," says Nancy Marrone-Hurley, a senior analyst with the Enterprise Storage Group (ESG) in Portland, OR. "But there are many other potential problems that most storage managers haven't even begun to ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • Moving target: Endpoint backup

    Mobile workers are now accessing, creating and modifying data on ultra-portable devices such as smartphones, tablets and phablets. Most companies ...

  • A lesson in flash caching

    Solid-state storage is proliferating as a replacement for hard disk drives, where it offers a quick shift into the fast lane of storage processing...

  • Storage performance management: Ways to maximize your environment

    Making your storage perform to the very best of its ability is an age-old problem with a long list of ways to approach it. But how should you start ...