Storage purchasing with an eye toward promised "treats" may ignore the "tricks" that follow.
A patent infringement case may be just the impetus IT needs to initiate data management projects.
We can’t expect vendors to solve all our problems. Sometimes we have to do the heavy lifting ourselves.
Do VMware engineers have a clue about storage?
Is server virtualization the answer to storage worst-case scenarios?
There's no such thing as perfect disaster readiness, but you can still make important decisions to protect your data.
With the Snap Server 700i series, by contrast, Adaptec has delivered a truly non-disruptive vertical and horizontal scaling approach in the form of "auto provisioning."
Now that SAS/SATA has achieved the status its champions said it would, how do vendors blend the software functions with their gear and provide usable functionality at a reasonable cost?
When politics and storage collide, the results are too often unpredictable and unnerving.
Do you know if your disaster recovery processes are up to date?
The downside of thin provisioning at the array level is not being fully articulated by any vendor.
It should come as no surprise that new companies have begun to carve out a part of the storage market for themselves.
Symantec Veritas CommandCentral is building a strong infrastructure monitoring and management approach that is worth a look.
A greater use of the "delete" key may be the greenest data strategy of all.
Confusing encryption with data storage security can be dangerous to your storage protection strategy.
One company offers a way to secure data when different classes of data have different security requirements.
Seagate’s announcement of Momentus drives with DriveTrust technology holds promise for enabling IT to secure data at rest
The best place for tape-based data encryption may well be on the media itself, but until key management issues are worked out, the strategy binds you to a particular vendor’s key management system for the foreseeable future. Our storage analyst, Jon Toigo, takes a closer look.
Placing storage security in the network is another option for locking down your data
One of the big puzzles of storage security is how best, architecturally speaking, to deploy the technology. BitArmor answers our questions.