[February 20, 2009] As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now.
The Storage Security SeriesThis series takes an in-depth look at the state of storage security, and includes articles that address what you can do today to protect your storage investments and what technologies are on the horizon to help improve security.
[January 16, 2009] It will take a whole lot of effort to get end-to-end data security, but it has to be done.
[April 24, 2008] As storage vendors struggle with security and encryption key management, standards groups hope to speed up the process.
[April 13, 2007] How Decru is helping customers like ISCorp encrypt and protect sensitive client data stored on tape and disk.
[February 22, 2007] The numbers have grown staggering, yet complacency still seems commonplace. What will it take for storage users and vendors to give security the attention it deserves?
[February 15, 2007] Four different standards groups are at work on storage security standards. Can they make it all work, and when will storage users see results?
[December 29, 2006] The Trusted Computing Group is working to address critical storage security issues.
[September 22, 2006] The storage giant's acquisition of RSA is the latest move in its ambition to become a general IT vendor.
[June 7, 2006] As storage users begin to demand greater security, vendors and others wonder how much should be free and what should cost extra.
[August 12, 2005] If you manage a storage network, it's your responsibility to ensure that data is secure regardless of its location. In the second part of our series on Storage Security, we help you devise a strategy.
[April 5, 2005] With public concern over lost and compromised data growing, the time is right to take a closer look at storage security best practices.
[March 15, 2004] SANs are useful for connecting multiple devices and storing information, but they're also highly vulnerable to hackers. The good news? A slew of new companies are taking aim at the problem.
[February 25, 2004] Like the candy-coated treats, SANs are an irresistible lure to criminals that can't wait to get to the soft, sweet center.
[January 27, 2004] IP-based SANs are attractive alternatives to their more expensive and complex Fibre Channel counterparts, but securing IP communications remains a significant concern. In our latest Storage Basics article, Mike Harwood examines how the IP Security Protocol (IPSec) can ensure the security of your iSCSI storage network's data.
[December 4, 2003] Managers who realize security is a huge problem at the corporate level don't always recognize just how insecure their storage networks really are. Drew Robb looks at the increasing prevalence of SAN insecurity and what IT managers can do to safeguard their storage assets.
[August 27, 2003] Storage security -- it's the two-ton elephant in the corner of the room that no one wants to mention, much less clean up after. But acknowledging the elephant's presence, and thereby taking the necessary steps to secure your enterprise's critical data, is imperative if your business is to survive, let alone thrive.
[August 6, 2003] The end-to-end security of corporate data is becoming an issue of increasing importance, yet the ideal of being able to secure data through every aspect of all systems within a heterogeneous environment remains years away. Henry Newman explores what currently works and what doesn't in the world of data security.
[July 25, 2002] Completing his look at the basics of SAN security, John Vacca discusses the security of a Fibre Channel infrastructure and looks at some of the tools system administrators can use to enforce security policies.
[July 23, 2002] With so much riding on your SAN, the security of your data should not be left to chance. In this, the first part of a two part tutorial on SAN security, John Vacca looks at some of the technologies and principles that you should consider when protecting your SAN.