Technology Communities |
SecurityMaterial on this page is intended solely for the purpose of content review by SNIA members. Tutorial material may be read and commented upon by any SNIA member, but may not be saved, printed, or otherwise copied, nor may it be shared with non-members of the SNIA. Tutorial managers are responsible for responding to all comments made during the open review period. No responses will be given to comments made outside the open review period. Jump straight to an abstract:
The Abstracts
Self-Encrypting Drives
Data security is top of mind for most businesses trying to respond to the constant barrage of news highlighting data theft and security breaches. Combined with litigation risks, compliance issues and pending legislation, companies face a myriad of technology and products that all claim to protect data at rest. However, these current solutions either fail to deliver or force compromise. The disk drive industry has launched innovative, simple and powerful technology intended to secure data where it lives – in the disk drive. This tutorial will give storage users and managers a look at emerging drive-level encryption technology for laptops, PCs, and data centers that provides a more secure storage foundation.
How E-Discovery Will Impact Your Life as a Storage Professional
Mention the term E-Discovery to a storage professional and watch their reaction. They may run away and hide. Storage Professionals today face the daunting task of being able to quickly know where every email, word document and database file lives and how to get it back in a hurry in the event of a catastrophe. With the recent update to the Federal Rules of Civil Procedure (FRCP) a storage professional now has even more pressure to potentially know the content inside those files.
ABCs of Encryption
Public disclosures of data “indiscretions” have become regular enough and embarrassing enough that many organizations are exploring encryption options both to satisfy information protection requirements and to simply stay out of the headlines. Those who have ventured into this space quickly realize that there is no “magic crypto fairy dust” that will make the problems go completely away. However, with careful planning and judicious use of the right technologies, organizations can eliminate many of their exposures. This session focuses on the efforts required at the storage layer to both create a successful encryption strategy and effectively deploy products that address encryption of data at-rest as well as data in-flight. The session is based on an established step-by-step process that is defined in detail in a SNIA white paper.
Introduction to Key Management for Secure Storage
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective key management policies. Without the proper generation, distribution, storage, and recovery of key material, valuable data will be eventually compromised. Worse, without proper management of key information, data can be completely lost. This session explores the fundamental issues and technologies that impact key management for disk, tape, array, and other storage devices. Major issues associated symmetric encryption keys are presented, along with practical advice on effective key management issues and practices.
SNIA Storage Security Best Practices With the increasing importance and emphasis on security in mind, the Storage Networking Industry Association (SNIA) had developed and published (see http://www.snia.org/forums/ssif/programs/best_practices/) a set of storage security best current practices (BCPs). This vendor neutral guidance has a broad scope, covering both storage systems and entire storage ecosystems. Specific elements include, but are not limited to, storage management, system configurations, protocols, compliance, encryption, key management, and long-term archive. This session provides an introduction to the BCPs as well as information that that will help organizations exploit the BCPs in their own environments.
Securing the Cloud – Using storage services without risking corporate data security
|
LoginFeatured Events
|

