Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 4 June 2006

Is encryption enough?

Encrypting data at rest is a reliable security measure, but it's only one component of an effective storage security plan. Attend a storage conference these days, and you might think encryption solves all of your storage security woes. It seems as if one "expert" after another is singing the praises of storage encryption for both data in transit and data at rest. But don't believe them. Encryption is part of the SAN security solution, but it has its limitations. "Encryption is an interesting option, but mainly for tape," says Tim Arland, principal consultant at Forsythe, a Skokie, IL-based storage systems integrator. "Real-time encryption of everything at line speed is very rare," adds Arland, yet that's ultimately what you would need if you want encryption to solve all of your SAN security problems. And even then, it might not work. What happens if a host bus adapter (HBA) spoofs an authorized system? More than encryption will be needed. The storage security problem transcends storage alone, which makes it unlikely that storage...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Deduplication extends to archives

  • Lock up data with fixed-content storage

    For most companies, fixed-content storage requirements are simple: Store the data securely, do it cheaply and provide fast access. With more data subject to external and internal audits, content-addressed storage products are becoming the preferred storage medium for long-term protection of fixed content.

  • Storage growth drives buying plans

    The results from our exclusive semi-annual Purchasing Intentions Survey are in. Storage growth is a key concern for storage managers, as additional capacity has a ripple effect that touches many other components in the storage environment.

  • Is encryption enough?

    Encrypting data at rest is definitely a reliable security measure, but it should be considered only one component of an effective storage security plan.

Columns in this issue

  • Time to think outside the box when it comes to data protection

    Storage Bin: The concept of "That's the way we've always done it" isn't going to work anymore, and it sure won't help you build an efficient disaster recovery plan. It's time to think outside the box when it comes to data protection.

  • The rise of the ultra-dense array

    by  Stephen Foskett

    Disk drives are getting smaller and smaller even as their capacities rise. Now storage vendors are packing more disks than ever into smaller spaces, which saves costly data center real estate. But the denser arrays also have a downside--higher power consumption and more heat.

  • A look at data classification products for e-discovery

    New technology products that look inside data can help you classify and manage that data more effectively. But these tools can also be leveraged for e-discovery, allowing specific data to be found and acted upon quickly to satisfy legal requirements.

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close