PRO+ Premium Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 6 No. 11 January 2008

Best Practices: Unraveling tape encryption

Tape encryption technologies and practices are on the rise. But with more choices than ever, careful consideration of the options is critical. Security and storage have traditionally been strange bedfellows, seemingly at odds despite so many efforts to sound the alarm concerning the risks inherent to networked storage environments. While awareness of the risks is on the rise, steps to address storage security holes have been slow to evolve. Still, the fear of being exposed on the pages of The New York Times and having to provide free Equifax credit checks to millions of consumers is incentive enough for most organizations to consider tape encryption. Despite steadily growing interest, the number of companies that encrypt their tapes remains relatively small. When SAN-based encryption appliances were introduced a few years ago, there was a significant uptick in encryption interest. With the emergence of new generations of tape drives featuring onboard hardware encryption, companies are revisiting their tape security practices in ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • 8Gb/sec Fibre Channel widens lane for SAN traffic

  • Unlimited storage

    Clemson University has big plans as it upgrades its data center—and those plans call for lots and lots of storage. Their new IT infrastructure is being built along the lines of the National Science Foundation's Cyberinfrastructure initiative. Clemson expects its new world-class facility to attract a new crop of young faculty who will find the storage, bandwidth and CPU resources needed to support their research efforts.

  • Taming storage virtualization

    Where storage virtualization should reside and how it should be applied depends on the size of the storage infrastructure, the type of applications running in it, and the levels of control and visibility required by administrators. We look at the leading storage virtualization products and help you decide which technology may be best for your storage shop.

Columns in this issue