Secure data storage

Email Alerts

Register now to receive SearchStorage.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • grid storage

    Grid storage is a general term for any approach to storing data that employs multiple self-contained storage nodes interconnected so that any node can communicate with any other node without the data having to pass through a centralized switch. (Cont... 

  • restore

    In data management, restore is a process that involves copying backup files from secondary storage to hard disk. (Continued...) 

  • What is the most important aspect of data protection when it comes to DR?

    You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether it's a backup, whether it's replication, whatever it is, make sure that you test what you put in place... 

  • Aren't backups and archives essentially the same thing?

    The answer to that can be a "yes" and "no." If we look at a very high level, a copy of data is a copy of data, and that's where a lot of people confuse both as being somewhat the same -- one copy is just kept longer. When we start digging into what a... 

  • Apple fixes Xsan security flaw

    Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available. 

  • The problem with unstructured information

    Information security expert Kevin Beaver highlights the problem of managing unstructured information and what you can do to keep your organization on the right track to storage security and out of hot water. 

  • EMC sheds light on RSA integration plans

    As the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here? 

  • Cost-effective legacy data protection

    For business, legal, regulatory and compliance reasons it is often important to protect data that is a decade old or more. Learn what you can do to cut data protection costs on older data. 

  • City relegates EMC Clariion to secondary storage

    The city of Cincinnati has bumped EMC's Clariion to secondary storage and made its HDS array its primary storage using storage replication software from Topio. 

  • Kerberos and its place in NAS authentication

    Kerberos security has been around since the 1980s, but many people are still unfamiliar with how it works. Storage expert Christopher Poelker explains how NAS environments can benefit from the use of Kerberos.