Network Appliance Inc. plans to introduce a virtual tape library (VTL) on Tuesday that will include an integrated data encryption appliance it acquired with the purchase of Decru Inc. last year.
Over a year ago, I wrote a column questioning the level of commitment to storage security within organizations (see “Do We Really Care About Storage Security?”). With growing pressures to contain cost ...
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software ...
Shifting storage network defenses toward an access control model capable of securing stand-alone tape drives, tape cartridges, tape automation and disk-based backup systems, Quantum Corp. this week ...
Sun on Wednesday unveiled the Sun StorageTek Crypto-Ready T10000 tape drive which enables the encryption of data as it is written to a cartridge, said David Kenyon, Sun's Storage Group senior director ...
Luminex Software Inc., a leading developer of mainframe channel gateway, connectivity and data storage products, announced today at the SHARE Technology Exchange Expo that its Channel Gateway 3400 ...
Tape drive-based encryption: Native tape-drive based encryption has just begun to appear on the market. IBM and StorageTek offer products for the high-end half-inch cartridge drives, and emerging ...
Following the highly publicized losses of backup tapes containing sensitive information about firms customers, many organizations are examining their own policies and technology options for protecting ...
Data storage security covers a wide landscape, including legal compliance, e-discovery, user access control and the physical security of data storage media. In this article we will focus on ...
I have a Dell TL2000 library controlled by Commvault.<BR><BR>Today I upgraded Commvault from 7.0 to 8.0 and now backups to that library (LTO3 media in an LTO4 drive ...
Encryption appliances can protect all the data that's in line be saved on backup media. And the servers and backup devices can operate at their own speed, as if there was no encryption being performed ...