PRO+ Premium Content/Storage

Thank you for joining!
Access your Pro+ Content below.
Vol. 2 No. 6 August 2003

Protect your SAN from attack

Pop quiz: Which presents the most security problems: network-attached storage (NAS) or a storage area network (SAN)? Careful, like those tricky SAT questions, the most obvious answer sometimes isn't the correct one. Storage security terms Authentication is the process of verifying an entity's identity by asking questions such as: Is this server's name really Elvis? Is this disk drive really drive number XYZ? Authorization determines which rights an authenticated entity possesses: Is Elvis allowed to read or write this block of data to this disk or tape? Encryption protects information from unauthorized access by converting it into an unreadable and random format that can only be accessed through appropriate credentials and/or keys. This ensures that if an unauthenticated, unauthorized server were to read a given block of data, it would be unable to use that data for any purpose. This includes encrypting user names and passwords that are used for out-of-band management of your storage area network (SAN). Auditing is the ability ...

Access this PRO+ Content for Free!

Features in this issue

  • Early Adopters Unequivocally Up About iSCSI Arrays

    After years of listening to iSCSI hype, some IT professionals are embracing a new generation of IP-based storage subsystems, a group that includes the PeerStorage Array 100E, an iSCSI array from Nashua, NH-based EqualLogic.

  • EMC Expands Reach of Symmetrix DMX

    The incredible expanding Symmetrix DMX

  • SRM Vendors Set Sights on Secondary Storage

    Storage resource management (SRM) has become a standard offering for primary storage from all of the major SAN management vendors. Now, a number of startups and established backup software makers have taken the features of SRM and aimed them at secondary storage.

  • File Virtualization Tackles NAS Management Woes

    Now that NAS farms have grown to multiterabyte proportions, management migraines usually associated with SANs have arisen, and virtualization--round two--has begun.

  • Can tools streamline provisioning?

    Virtualization was last year's buzz word, and it looks like provisioning may be this year's. We dissect what these tools actually do and how to choose which ones that are likely to actually be useful in your environment.

  • The best way to scale SANs

    by  Stephen Foskett

    SAN configurations greatly influence their scalability. There's no perfect model, but here are the trade-offs involved with each major option.

  • Why consolidate?

    Organizations trying to consolidate storage often find themselves creating SAN islands that perpetuate traditional stovepipes. Does this solve the problem?

  • E-mail: It's worse than you think

    by  Eric Knorr

    According to a 2003 study by Meta Group, 80% of businesspeople say e-mail is more essential than the telephone. However, storage managers are struggling to keep pace with the growth in message volume and retention requirements. however.

Columns in this issue