Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Market Analysis: Storage Security

Dig Deeper

Read On

Security professionals are largely unfamiliar with the SANs and databases they're supposed to be protecting. Although they surely realize that Fibre Channel is not a new health-food spin-off of Food TV, they're less aware that data running over an FC SAN is as readily readable as data running over an IP network.

Lemonade, Anyone?

Smart storage pros will make the most of this situation by working with their security teams to build a storage-security system that will protect data with minimal impact on uptime.

The first step in locking down your critical stored data is to determine which type of security best suits your organization. Stored data is vulnerable in more places than you might think, including at the application, host, switch, and LUN or block levels. Fortunately, there are plenty of products to address these problem areas. With offerings from vendors like Ingrian and Protegrity, you can encrypt select database columns. Alternatively, you can implement SAN access control from switch vendors, or SAN encryption and access control from vendors such as Cisco Systems, Decru, Kasten Chase and NeoScale. Some products also limit access by application (see "Securely Stowed,").

  • 1