Premium Content

Access "Putting storage security policies in place with information life cycle management"

Published: 17 Oct 2012

I can't remember anything that's lit a fire under the industry as much as information life cycle management (ILM). The Enterprise Storage Group (ESG), Milford, MA, defines ILM as a series of technologies and processes that enable resource optimization, effective data protection and superior application performance. While ILM may be years away, it will likely involve a number of storage services that automate data movement based upon attributes such as business rules, operational policies and protection requirements. No doubt about it, the ILM vision provides some valuable storage-focused qualities. But will it be secure? Hey, I can't help it--we security geeks look at new technologies and ask questions like, "What kind of damage could I do?" And of course, "How could I cover my tracks so I wouldn't get caught?" The unfortunate conclusion I have come to is the current ILM plan either minimizes or totally ignores security, and this isn't a small snafu--it's a major omission. According to a recent Price Waterhouse survey, corporate executives state that more ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free