PRO+ Premium Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 9 November 2006

Security for your security appliances

Decru, the storage encryption company owned by Network Appliance, is using Mu Security's security analysis product to find vulnerabilities in its own security appliances. If this sounds paranoid, think again, says Jon Oltsik, senior analyst, information security at Enterprise Strategy Group, Milford, MA. "Extending the vulnerability mindset into storage is an important step toward really safeguarding sensitive data," he says. "Encryption technology has a giant target painted on it." Decru has deployed the Mu-4000 Security Analyzer to "see where hackers might be able to exploit our product," says Kevin Brown, Decru's VP of marketing. "It generates millions of permutations for how hackers might attack us. For example, is our key management system leaking information?" By using the tool, Decru hopes to catch vulnerabilities earlier in its development cycle and speed up its time to market, says Brown, adding that none of Decru's customers has reported any weakness in the product yet. Joel Schwalbe, VP of technical services at CNL ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Rough going for Exchange replication

    by  Trina MacDonald, Trends associate editor

    Replicating databases for disaster recovery isn't easy, and Microsoft Exchange is no exception.

  • New frameworks give users more choices

  • Automate data migration

    Moving seldom-accessed data from primary storage to less-costly storage not only saves money, but can also improve the performance of applications. Hierarchical storage management (HSM) software can help automate the migration of files, but HSM products vary in the way they approach the task. So it's important to identify the requirements of an HSM product before making a choice.

Columns in this issue

  • Tape encryption strategies

    by  Jon Oltsik

    Companies need to take a more strategic approach to tape encryption by building a services-based architecture that can meet today's needs and scale to accommodate future needs.

  • A new startup promises recordless e-mail

    Storage Bin: A new startup promises recordless e-mail. Is this a stroke of genius that will reward the company with billions of Internet bucks, or is it the end of the world as we know it?

  • How to better connect storage to the business

    by  James Damoulakis

    We can learn from manufacturing processes and use a supply chain to storage to better align it with strategic business goals. To implement this model, a storage services plan needs to be multidimensional and encompass performance, availability, data protection, data movement and migration, and data retention.