PRO+ Premium Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 1 No. 8 October 2002

Protect Data at Rest

IPsec, FCSec, LUN masking, zoning, authentication - these are all powerful tools to help you secure networked storage. But some start-ups argue that these may not be enough. Let's suppose that a malicious hacker does manage to gain access to your storage. What now? In the absence of airtight security, your best bet may be to encrypt your data where it resides, says Phil Grasso, vice president of marketing at Vormetric. Encrypting data at rest, so to speak, isn't a new idea, but most existing encryption products don't take into consideration the concerns of storage managers, notably, performance and transparency, advocates of the technology say. For performance reasons, Vormetric and its competitor NeoScale each take an appliance approach, and claim to encrypt data at wire speed. Addressing storage transparency is trickier. By encrypting data, "you want to make sure encryption doesn't break, say, virtualization," Grasso says. Ultimately, encrypting data is "the last line of defense because we are protecting the core data," says ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue