Premium Content

Access "Secure iSCSI storage"

Published: 20 Oct 2012

With a little planning, your iSCSI storage network can be even more secure than a legacy Fibre Channel storage network. If you're thinking about implementing an iSCSI storage network, as sure as the sun sets each night, someone will ask about security. Here's the short answer: iSCSI can be as secure as you want it to be. "Now that storage is being put back on Ethernet and IP networks, customers are becoming concerned about access control and encryption," says Kyle Fitze, marketing director for Hewlett-Packard Co. SANs, StorageWorks Division. The commodity protocols and hardware used in iSCSI networks can, in theory, connect to just about any computer, from a rack-mounted server to a laptop or handheld PC. iSCSI was built from the ground up with strong authentication and encryption capabilities ... as long as they're used. So if iSCSI has so many security features, why do so many people ask about security? The reason is that iSCSI is much more accessible than previous storage protocols. Ethernet hardware and IP support have become ubiquitous, both inside and ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

    • Survey Says: WAFS adoption picks up

      WAFS adoption picks up

    • Storage rethinks power strategies

    • Midrange rivals top dog

      Midrange arrays are encroaching on enterprise storage territory. Today's high-end midrange arrays and low-end enterprise arrays might look very similar. Features like clustering, mirrored cache, replication and snapshots have trickled down from enterprise arrays, while low-priced SATA drives have moved up to enterprise arrays.

    • Users test deduplication limits

    • Negotiating for support

      Over a period of just a few years, the amount you spend on support contracts could equal or even exceed the price of the product itself. But storage support contracts are usually optional, and both the extent of coverage and its cost are definitely negotiable. A little hard bargaining and creativity, along with the leverage of seeking maintenance from a third-party support company, can go a long way toward knocking down your support costs.

    • Storage managers in control

      For the first time in five years, the amount of capacity storage managers plan to add this year dropped, according to the results of Storage magazine's latest Purchasing Intentions Survey. To be sure, the decrease was more of a sign that relief may be on the way for storage managers who have spent the last few years trying to keep up with runaway storage growth.

  • Columns
    • Hot Spots: Time to learn from Microsoft's mistakes by Jon Oltsik

      Security is a cradle-to-grave commitment that spans products, processes and personnel. Microsoft has proved that you can turn on a dime and remedy security shortcomings, and now some leading storage vendors are following its example.

    • Storage Bin: 50 years of right is now very wrong

      A huge portion of the issues we face today in storage and throughout our infrastructure are caused by us trying to use the same systems, architectures and methodologies we're used to for data that has all new requirements.

    • Editorial: Top 10 reasons to find another vendor

      Top 10 reasons to find another vendor

    • Best Practices: Protecting SharePoint data

      SharePoint's collaboration framework is gaining in popularity, but it has a number of data protection challenges that can result in significant levels of complexity rather quickly. Storage and data protection groups must work with application teams to plan an effective data protection strategy.

More Premium Content Accessible For Free