By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Secure data storage News
June 07, 2017
A Scality storage upgrade for RING adds versioning and replication capabilities for both object storage and file protocols, as well as greater interoperability between objects and files.
March 23, 2017
U.S. organizations are taking General Data Protection Regulation (GDPR) compliance at least as seriously as their European Union counterparts, according to a recent survey commissioned by Veritas ...
March 03, 2017
Scality's RING object storage technology provides customers with a new HALO Cloud Monitor that uses machine learning for capacity planning and predictive analysis.
February 28, 2017
Datrium's Blanket Encryption software encrypts deduplicated and compressed data from servers to storage, but doesn't yet support third-party key management products.
Secure data storage Get Started
Bring yourself up to speed with our introductory content
NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption. Continue Reading
Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a man-made or natural catastrophe. Continue Reading
Point-in-time snapshots are a method of data protection that allows an administrator to make a full copy of a volume so that a restore can occur based on a specific time. Continue Reading
Evaluate Secure data storage Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Though vendors are calling their data protection products 'holistic,' they should blend security and disaster recovery services to improve their functionality. Continue Reading
Through disk-based backup, continuous data protection enables backups to take place more often. Discover how to repair the technology's cost and capacity problem. Continue Reading
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
Manage Secure data storage
Learn to apply best practices and optimize your operations.
If you want to exercise some cost containment, forget the hardware for a moment and focus on data management. Continue Reading
By using these three methods to understand the type of protection your applications need, you'll achieve a more efficient data protection strategy. Continue Reading
New data protection management tools can provide early warnings about gaps in the data protection process. Continue Reading
Problem Solve Secure data storage Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Traditional RAID methods and their rebuild processes have some shops suffering long downtimes -- enter erasure codes and multi-copy mirroring. Continue Reading
Erasure coding can help reduce the data needed for backups and lower the cost of backup and recovery over the traditional approach, Wikibon CTO says. Continue Reading
Replication is critical for disaster recovery in IT shops. UC Santa Cruz professor evaluates erasure coding versus replication in data storage. Continue Reading