Protect Data at Rest


This article can also be found in the Premium Editorial Download "Storage magazine: Tame the e-mail beast: Valuable e-mail management strategies."

Download it now to read this article plus other related content.

IPsec, FCSec, LUN masking, zoning, authentication - these are all powerful tools to help you secure networked storage. But some start-ups argue that these may not be enough.

Let's suppose that a malicious hacker does manage to gain access to your storage. What now?

In the absence of airtight security, your best bet may be to encrypt your data where it resides, says Phil Grasso, vice president of marketing at Vormetric.

Encrypting data at rest, so to speak, isn't a new idea, but most existing encryption products don't take into consideration the concerns of storage managers, notably, performance and transparency, advocates of the technology say.

For performance reasons, Vormetric and its competitor NeoScale each take an appliance approach, and claim to encrypt data at wire speed.

Addressing storage transparency is trickier. By encrypting data, "you want to make sure encryption doesn't break, say, virtualization," Grasso says.

Ultimately, encrypting data is "the last line of defense because we are protecting the core data," says Scott Gordon, vice president of marketing at NeoScale."No one product is a silver bullet."

Requires Free Membership to View

This was first published in October 2002

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: