PRO+ Premium Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 4 No. 9 November 2005

The business aspect of data storage security

Two years ago, I was one of the lone voices speaking about storage security. When I reached out to the storage community I couldn't get anyone--not users, vendors or services companies--to speak to me. I was one isolated dude. But now the phone is ringing off the hook. Users want to know what they should do first, while vendors are assessing how much security is needed in their products and when. This is a huge and very encouraging change, but storage security is a subset of a bigger topic: storage risk management. I recently had the opportunity to discuss risk management with three storage security services firms: Computer Associates, GlassHouse Technologies and Kasten Chase. Each of these firms offers risk and gap analysis assessments that define problems; measures performance against industry standards like IT Infrastructure Library/IT Service Management (ITIL/ITSM), Committee of Sponsoring Organizations/Control Objectives for Information and related Technology (COSO/COBIT), or ISO 17799; and recommends remediation activities...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Quality Awards: What are the best midrange arrays?

    Midrange array users are a generally satisfied group, according to the latest Diogenes Labs-Storage magazine Quality Awards survey. While all midrange array vendors fared quite well in this third installment of our awards program, the vendor that snared top honors might surprise some people.

  • Easing away from ESCON

    by  Alex Barrett

    ESCON, the protocol that pre-dated FICON as a systems-to-storage connection, is incompatible with the newer FICON-based systems. This tip looks at various ways you can tackle this dilemma.

  • Secure your backups

    The headlines tell the story: Lost tapes can jeopardize the confidentiality of personal information and cause public-relations woes for those companies charged with safeguarding that data. Encryption can solve the problem, but implementing tape encryption isn't so easy, as performance issues could impact backup windows.

Columns in this issue