cecs - Fotolia
I don't think there is any one archival technology that could be considered vastly superior to the others from a security standpoint. Each has its own advantages and disadvantages. If I had to pick a single technology as offering the most archive security, I would probably go with tape -- but with some caveats.
The reason tape may be the more secure medium is because unlike disk- and cloud-based archives, tape-based archives generally remain offline unless they are needed. It's impossible for a hacker to access the data from a tape that is not mounted in a tape drive, but rather is locked away in a vault somewhere.
Of course, some would point out the potential for tape theft. In fact, I remember getting interviewed for a data security magazine way back when Windows 2000 was first released. One of the questions I was asked was how a hacker might penetrate a Windows 2000 server. My answer at the time was that if I were attempting to hack such a server, I wouldn't directly attack the server, but rather would restore a backup tape to my own hardware and then use a combination of tools to gain access from outside the operating system.
Obviously, that was a long time ago, but I believe the lesson still holds true today. If not properly secured, backup tapes represent an easily exploitable weakness. Thankfully, there are methods to adequately protect backup tapes. For example, the tape contents can be encrypted in such a way that prevents the tape from being read by any tape drive other than the one containing the certificate that was used to perform encryption.
I say all that as a way of illustrating the point that I think tape can be very secure, but the administrator must take care to ensure the necessary archive security precautions are taken. Otherwise, anyone can access archive data simply by stealing a tape.
Best practices for data archiving
Ensuring secure electronic healthcare information storage
Dig Deeper on Tape backup and tape libraries
Related Q&A from Brien Posey
Rather than handling risk management and mitigation within your organization, outsourcing these important processes to a third party comes with ... Continue Reading
Big data analytics can help businesses spot past mistakes, forecast conditions and improve future strategies. So, why should resilience planning be ... Continue Reading
Hyper-V and VMware are in a perpetual battle for supremacy in the virtualization market. Although the two hypervisors have similar features, ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.