Secure data storage

Email Alerts

Register now to receive SearchStorage.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Apple fixes Xsan security flaw

    Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available. 

  • The problem with unstructured information

    Information security expert Kevin Beaver highlights the problem of managing unstructured information and what you can do to keep your organization on the right track to storage security and out of hot water. 

  • EMC sheds light on RSA integration plans

    As the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here? 

  • Cost-effective legacy data protection

    For business, legal, regulatory and compliance reasons it is often important to protect data that is a decade old or more. Learn what you can do to cut data protection costs on older data. 

  • City relegates EMC Clariion to secondary storage

    The city of Cincinnati has bumped EMC's Clariion to secondary storage and made its HDS array its primary storage using storage replication software from Topio. 

  • Kerberos and its place in NAS authentication

    Kerberos security has been around since the 1980s, but many people are still unfamiliar with how it works. Storage expert Christopher Poelker explains how NAS environments can benefit from the use of Kerberos. 

  • Protect your data from hidden threats

    Many organizations have a good handle on external risk, but this tip discusses how companies can protect themselves against the internal risks that are often forgotten. 

  • RSA Security may not be the 'pearl' EMC thinks it is

    Having outbid other suitors, EMC must now sell the purchase to its shareholders and make use of RSA's technology. Will the strategy work? 

  • Storage Clips: Kasten Chase closes its doors

    Canadian storage encryption and key management firm Kasten Chase is ceasing operations and has assigned the assets of the company to a trustee in bankruptcy. 

  • Guidelines for better iSCSI security

    Learn about the following iSCSI SAN security guidelines: How to secure the management interface, how to authenticate and how to disable unnecessary network services.