Secure data storage

Email Alerts

Register now to receive SearchStorage.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • The past, present and future of RAID data protection

    Seemingly everyone working in IT knows the power of RAID, and setting various RAID levels continues to be a solid foundation of a data protection strategy. But RAID efficiency is being put to the test by rapidly expanding data stores, and the storage... 

  • Best practices for cloud backup integration

    In the cover story of the April 2012 issue of Storage magazine, Lauren Whitehouse outlines best practices for cloud backup integration and the various methods for doing so. Also included in this issue are articles regarding virtual server management,... 

  • Better data protection strategies with CDP and deduplication

    Continuous data protection (CDP) and data deduplication are chief among the technologies that data storage managers are investigating when it comes to improved data backup and storage efficiency. In this expert e-book, learn how CDP and deduplication... 

  • CDP 2.0: Finding success with the latest continuous data protection tools

    Continuous data protection received a cool reception at first, but storage managers have found success with second-generation CDP products. Also, learn how storage managers cope with tighter budgets, and get information on storage for high-performanc... 

  • Betting on an enterprise-level virtual tape library (VTL)

    Michael Grillo at Foxwoods Resort Casino cashed in on an enterprise-class VTL to safeguard data. Also, learn how SaaS offers an alternative to buying storage. 

  • disaster recovery as a service (DRaaS)

    Disaster Recovery as a Service (DRaaS) is the replication and hosting of physical or virtual servers by a third-party to provide failover in the event of a man-made or natural catastrophe. 

  • data destruction

    Data destruction is the process of destroying data stored on tapes, hard disks and other forms of electronic media so that it is completely unreadable and cannot be accessed or used for unauthorized purposes. 

  • data protection

    Data protection is the process of safeguarding important information from corruption and/or loss. 

  • hot spare

    A hot spare, also called a hot standby, is a backup component that can be placed into service immediately when a primary component fails.  

  • write through

    Write through is a storage method in which data is written into the cache and the corresponding main memory location at the same time. The cached data allows for fast retrieval on demand, while the same data in main memory ensures that nothing will g... 

  • data at rest

    Data at rest is a term that is sometimes used to refer to all data in computer storage while excluding data that is traversing a network or temporarily residing in computer memory to be read or updated. 

  • Business Continuity and Disaster Recovery (BCDR)

    Business Continuity and Disaster Recovery (BCDR or BC/DR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations. (Continued...) 

  • continuous data protection (storage convergence)

    Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made. (Continued...) 

  • Storage as a Service (SaaS)

    Storage as a Service (SaaS) is a business model in which third-party providers rent space on their storage to end users that lack the capital budget and/or technical personnel to implement and maintain their own storage infrastructure. 

  • Learning Guide: Firewalls

    How to select the right firewall for your needs 

  • See more Definitions on Secure data storage
About Secure data storage

Data must be stored securely, and you'll find news about storage security and storage encryption on this topic page.