Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

How Secure Is Your SAN?: Page 10 of 10

"Which applications are using the SAN? What data is critical? What would happen if a failure occurs? These are the questions you need to start with," says Piers McMahon, director of architecture for Computer Associates' eTrust Group. In many cases, risk can be significantly reduced by using existing server- and application-security tools rather than deploying new storage-level encryption, McMahon says.

Another step companies can and should take now is to develop a prescribed set of responses should their storage network be penetrated. In much the same way that network administrators have a script of actions to take when a virus strikes, storage administrators should have a pre-defined set of procedures in place that will allow them contain a storage security breach and quickly turn to back-up storage.

"Technology is only going to solve 30% to 40% of the storage-security problem anyway," says The451's Robinson. "The rest will have to be done through policies, guidelines, and procedures."

Jeff Moad is a Bay Area freelance writer.