TITLE

is your SAN in the Zone?

AUTHOR(S)
Preston, W. Curtis
PUB. DATE
September 2003
SOURCE
Storage Magazine;Sep2003, Vol. 2 Issue 7, p44
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Explains the real difference between hard and soft zoning, as well as the differences between soft zoning and world-wide name-based zoning in the field of storage area network (SAN) security. Aspects of network security; Comparison of the functions of hard and soft zoning; Reasons for using soft zoning. INSETS: ISN'T HARD ZONING THE SAME AS PORT-BASED ZONING?;WHAT'S PORT BINDING;TWO WAYS TO ZONE.
ACCESSION #
11267036

 

Related Articles

  • CLOUD: NEW AGE DEFENSE. Romeo, Jim // Sports Car;Jan2014, Vol. 25 Issue 1, p26 

    The article focuses on the security of the cloud computing networks. Topics discussed include the security risks in cloud computing, defense-in-depth security system for cloud computing, and user information on cloud computing service. Also mentioned are the cloud computing security systems for...

  • Reducing Storage Costs Without Compromising On Quality. Blanford, Richard // Database & Network Journal;Oct2009, Vol. 39 Issue 5, p18 

    The article focuses on how to reduce network storage costs without compromising data security and quality of service. It notes that a company can save by infrastructure consolidation because of better use of central resources and decreased systems management and administration. Both operating...

  • Secure SAN pathways. Brooks, Darryl // Storage Magazine;Mar2003, Vol. 2 Issue 1, p64 

    Gives advice on securing storage area networks (SAN). Comparison between SAN and direct-attached storage; Factors to consider when physically securing SAN; Approach used in securing management applications within SAN; Characteristics of security flaws in the Device:device interaction.

  • MCDATA LAUNCHES SANTEGRITY SECURITY SUITE.  // Networks Update;Oct2002, pN.PAG 

    Reports on the launch of the McDATA SANtegrity Security Suite of security solutions for storage area networks by McDATA Corp. in 2002. Key function of the product; Features of the software; Benefits from the solutions.

  • Encrypt Almost Anything. CASTLE, ALEX // PCWorld;Apr2013, Vol. 31 Issue 4, p29 

    The article discusses data encryption and computer security and computer software security measures. The use of BitLocker software from Microsoft Corp. to encrypt an entire hard drive is discussed. The use of virtual private networks (VPN) to encrypt data when using an unsecured Wireless...

  • How secure is your storage network? Rajendran, Ravi // NetworkWorld Asia;Nov2007, Vol. 3 Issue 10, p41 

    The article offers techniques on how to secure storage network. According to the author, storage network is one of the essential aspects of businesses in supporting critical business applications and services thus making them vulnerable to data damage and corruption. It includes data security...

  • Another Look at "Provable Security". Koblitz, Neal; Menezes, Alfred J. // Journal of Cryptology;Winter2007, Vol. 20 Issue 1, p3 

    We give an informal analysis and critique of several typical "provable security" results. In some cases there are intuitive but convincing arguments for rejecting the conclusions suggested by the formal terminology and "proofs," whereas in other cases the formalism seems to be consistent with...

  • As easy as one, two, ten. Kurtz, Paul // SC Magazine: For IT Security Professionals (UK Edition);Jul2004, p26 

    This article presents the steps in creating a solid cybersecurity program. To enable the information technology revolution to reach its full potential, cybersecurity vendors must work with hardware and software vendors to make their products more secure while working with end-users to protect...

  • Hold the Fort. Ohlhorst, Frank J. // Entrepreneur;Jan2004, Vol. 32 Issue 1, p47 

    Evaluates products that safeguard computer networks and personal computers from invasions by worms, viruses and other dangerous agents. Symantec's Norton Internet Security 2004 Professional Edition; MicroWorld's eScan 2003 Internet Security Suite.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics