Storage for Compliance Applications
|
|
- Nicholas Harrington
- 6 years ago
- Views:
Transcription
1 Storage for Compliance Applications Karthik Kannan Network Appliance 495 E Java Drive, Sunnyvale CA Phone: kkannan@netapp.com Presented at the THIC Meeting at the Sony Auditorium, 3300 Zanker Rd, San Jose CA April 19-20,2005 9/5/2004 1
2 Agenda Compliance challenges and trends Regulatory requirements for storage SnapLock TM introduction SnapLock differentiators SnapLock summary 9/5/2004 2
3 Agenda Compliance challenges and trends Regulatory requirements for storage SnapLock TM introduction SnapLock differentiators SnapLock summary 9/5/2004 3
4 Many Regulations, Diverse Requirements SEC 17a-4 Sarbanes-Oxley GoBS SB 1386 Basel II Check 21 Graham-Leach-Bliley Act Patriot Act HIPAA Many regulations affect business operations Some have specific storage requirements Others leverage storage infrastructure 9/5/2004 4
5 Regulated Data Growth Exploding More data under regulatory purview Structured Data Semistructured Data Unstructured Data Long retention times Sarbanes-Oxley: Audit Correspondence Audit + 7 Years SEC 17a-4: , Financial Records 3 Years Trading Records End of Account + 6 Years HIPAA: Hospital Records 5 Years Medical Records Life of Patient + 2 Years Minimum Compliance Retention Period (Years) 9/5/2004 5
6 Trends Driving Regulatory Solutions Costs of noncompliance are high High fines Damage to company reputation Need rapid information access and retrieval Fines for slow recovery Need quick response in legal discovery Retrieving data from offline storage is expensive 9/5/2004 6
7 Trends Driving Regulatory Solutions Disk Prices Falling; Drive Reliability Increasing $10 $ per Gigabyte Tape Disk $10/GB $ Specified Mean Time between Failures 1,500 Enterprise K Hours 500 Desktop Result: Compliance Storage Moving to Higher- Capacity, Reliable, Lower-Cost WORM Disks 9/5/2004 7
8 New Options: Disk and Tape Pricing Trends Cost ($/GB) $10,000 $1,000 $100 $10 $1 $0 Tape IDE/ATA Disk Chart source: Seagate Technologies. Prices are for drive/tape media cost only. Does not include library, robotics, shelf, carrier, compression, RAID, or software costs, nor operational and management costs. Disk costs near tape costs Disk TCO lower than tape TCO 2004 capacities* ATA 320GB LTO-2 200GB 3590H1A 20GB 9940A 60GB 9940B 100GB 2006 (expected)* ATA >1TB LTO-3 400GB 9940B 200GB *Native capacities for one disk or one tape without compression 9/5/2004 8
9 Agenda Compliance challenges and trends Regulatory requirements for storage SnapLock TM introduction SnapLock differentiators SnapLock summary 9/5/2004 9
10 Regulatory Requirements Are Diverse SEC 17a-4(f)(2)(ii)(B): Verifies automatically the quality and accuracy of the storage media recording process. SEC 17a-4(f)(2)(ii)(A): Preserves the records exclusively in a nonrewritable, nonerasable format. GLBA 501(b)1: insure the security and Confidentiality of customer records and information. GLBA 501(b)2: Protect against any anticipated threats or hazards to the security or integrity of such records. HIPAA (a)1: Ensure the confidentiality, integrity, and availability of all EPHI the CE [covered entity] creates, receives, maintains, or transmits. HIPAA (c)2: implement electronic mechanisms to corroborate that EPHI has not been altered or destroyed in an unauthorized manner. SoX 1520(a)(1): shall maintain all audit or review work papers for a period of five years (revised to seven years). 21CFR 11.10(a): Validation of systems to ensure and the ability to discern invalid or altered reports. 9/5/
11 Compliance Drivers and Requirements Market Drivers Litigation protection regulations: SEC 17a-4 Sarbanes-Oxley NASD 3010/3110 DOD SB 1386 Graham-Leach- Bliley HIPAA Basel II Check 21 GoBS Patriot Act 21 CFR Part 11 UK Data Protection Act Compliance Requirements Data permanence: Immutable storage Data authenticity Data integrity Data replication Privacy and security: Authorization Access controls Encryption Auditing Secure deletion Most Companies Are Subjected to Multiple Regulations 9/5/
12 Agenda Compliance challenges and trends Regulatory requirements for storage SnapLock TM introduction SnapLock differentiators SnapLock partners and customers SnapLock summary 9/5/
13 Data Permanence Solution: SnapLock Nonerasable, nonrewritable magnetic disk storage (WORM) Add-on software license Enabled at a volume level Fine-grained management File-level retention policies Reclaim space with file expiration Tamperproof ComplianceClock Open protocol interfaces Data access via CIFS and NFS Easy application integration without closed, proprietary APIs High performance implemented on industry's fastest NAS platforms 9/5/
14 SnapLock TM Implementation LAN LAN or or WAN WAN Data ONTAP TM Operating System CIFS Windows NFS UNIX, Linux WAFL File System Disk Management (RAID) Other Protocols Volume #1 Regular Volume #2 SnapLock SnapLock is tightly integrated into Data ONTAP Enforcement takes place from the file system to RAID layers independent of protocol 9/5/
15 SnapLock TM : Simplicity Application Basic Data Storage Primary Storage CIFS or NFS Protocol WORM Volumes Archival Application Access Data and Move to WORM Storage Filer Create a SnapLock compliance (WORM) volume Archive files to SnapLock volume via CIFS/NFS Set each file s expiration date You can always extend the retention period, but can never shorten it Mark files read only Prevents any and all alterations, overwrites, or deletions until file expiration NearStore 9/5/
16 Complementary DATA ONTAP TM Features: Data Integrity Protection before data written to disk NVRAM holds data until written to disk Automatic error scanning Block-level checksums Immediate write verification Media scans Self-healing RAID for media errors or single-disk failure RAID-DP for double-disk failure RAID scrubs 9/5/
17 Complementary Data ONTAP TM Features: Security and Confidentiality Confidentiality IPSec protocol SSH/SSL-encrypted management interface Authentication Kerberos, LDAP authentication Authorization Active directory; cross-platform ACLs LUN masking, hard zoning, port binding MultiStore TM Auditing Syslog, CIFS access logging Shredding Volume sanitization, cryptoshredding 9/5/
18 Regulated versus Enterprise Records Retention SnapLock Compliance Strict SnapLock Trust nobody Permanently nonerasable, nonrewritable disk storage (WORM) Until file expiration Safe from any keyboard attack Complies w/ SEC regulations Meets SEC 17a-4 requirements Easy WORM-to-WORM replication SnapLock Enterprise Flexible SnapLock Trust administrator Revision-safe, long-term storage solution Virus and application bugproof Enables best practices business records retention Partial storage admin control Admin can destroy volume to reclaim space Cannot modify/delete individual records 9/5/
19 Agenda Compliance challenges and trends Regulatory requirements for storage SnapLock TM introduction SnapLock differentiators SnapLock summary 9/5/
20 Unified Architecture, Open Protocols One architecture, one management interface: Full interoperability Reduced training Higher productivity Archive Reference Remote Office Back Office Operational Business-Critical Open protocols: Easy integration No vendor lock-in 10x to 100x faster than API solutions Start small and scale with need: 0.5TB to 96TB on a single system 9/5/
21 NetApp Delivers Total Enterprise Compliance Total Enterprise Compliance Remote Site FAS Primary Storage Windows Primary Site UNIX NetApp Cluster NetApp gfilers Windows Server ERP/ECM Server DR Site DR Site LockVault LockVault Data Privacy Compliance NearStore Compliant Efficient Backups Archival Application SnapMirror Compliance Journal SnapLock NearStore SnapMirror Unified Backup and Compliance Policy-Driven Compliance 9/5/
22 Agenda Compliance challenges and trends Regulatory requirements for storage SnapLock TM introduction SnapLock differentiators SnapLock summary 9/5/
23 Media and Analyst Opinions NetApp is offering its customers a flexible way to deploy WORM functionality into existing environments across different tiers of storage. Peter Gerr Enterprise Strategy Group 9/5/
24 Media and Analyst Opinions The SnapLock software is particularly impressive given the sensitive nature of archived documents, especially in light of recent regulatory and financial scandals. The idea that a backup onto a file server can be nearly as well protected as backups to a secure off-site or optical vault is impressive. Once [the] data sources are defined and have been successfully backed up to the R150 once, the system is close to install and forget, doing its work with minimal administration. The benefit is that a company won't need to hire additional administrators to run a NearStore R150 system. Alan Zeichick InfoWorld 9/5/
25 Media and Analyst Opinions The market has quickly shifted though from purpose-built systems to software that is disaggregated from hardware. Network Appliance SnapLock set the precedent for that." Peter Gerr Enterprise Strategy Group 9/5/
26 Media and Analyst Opinions Unveiled in April, SnapLock provides online archival and long-term protection of data. Using a feature called WORM write once, read many the software marks the files as read only, thereby preventing them from being altered. Marilyn Much Investor s Business Daily 9/5/
27 SnapLock TM Customers Over 4 PB of compliance storage Over 250 customers Customers span multiple industries Deployed worldwide Used to comply with SEC 17a-4, GoBS, GLBA, HIPAA, SoX, etc. Independently audited for compliance E.g., Cohasset SEC 17a-4 4 report *, GoBS certification * 9/5/
28 Thank you.
Automated Tiered Storage by PoINT Storage Manager Optimizing the storage infrastructure concerning cost, efficiency and long-term availability
PoINT Software & Systems GmbH White Paper Automated Tiered Storage by PoINT Storage Manager Optimizing the storage infrastructure concerning cost, efficiency and long-term availability Growth of Unstructured
More informationDesign of a WORM Filesystem Terry Stokes Dell EMC/Isilon
Design of a WORM Filesystem Terry Stokes Dell EMC/Isilon Who am I? 15+ years in network protocols. Previously worked at Blue Coat Systems, RadioFrame and Microsoft Anti-trust (MCPP). Co-founded a network
More informationSecuring Data-at-Rest
Securing Data-at-Rest Robert A. (Bob) Lockhart NeoScale Systems, Inc. 1655 McCarthy Blvd, Milpitas, CA 95035-7415 Phone:+1-408-473-1300 FAX: +1-408-473-1307 E-mail: rlockhart@neoscale.com Presented at
More informationIntroduction to Digital Archiving and IBM archive storage options
Nils Haustein Executive IT Specialist EMEA Storage Competence Center Introduction to Digital Archiving and IBM archive storage options Agenda Introduction to Archiving Archiving Techniques IBM Archive
More informationDELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE
WHITEPAPER DELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE A Detailed Review ABSTRACT Enterprises continue to see an exponential growth in the structured and unstructured data that is proliferating across
More informationINTEGRATING EMC XTENDER AND DISKXTENDER FOR ELECTRONIC MESSAGING ARCHIVAL WITH NETAPP NEARSTORE
White Paper INTEGRATING EMC EMAILXTENDER AND DISKXTENDER FOR ELECTRONIC MESSAGING ARCHIVAL WITH NETAPP NEARSTORE Abstract This white paper describes how to use the EMC EmailXtender archiving solution to
More informationCompliant WORM Storage Using NetApp SnapLock
Technical Report Compliant WORM Storage Using NetApp SnapLock ONTAP 9.3 Arpan Merchant, NetApp March 2018 TR-4526 Abstract Many businesses rely on some use of write once, read many (WORM) data storage
More informationInformation Lifecycle Management with Oracle Database 10g Release 2 and NetApp SnapLock
Information Lifecycle Management with Oracle Database 10g Release 2 and NetApp SnapLock Regulatory Compliance for Enterprise Data with Oracle Database 10g Release 2 and NetApp SnapLock Arvind Shrisvastava,
More informationWHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4
WHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4 Prepared By Chris Jones Documentation and Content 417.886.7505 cjones@paperwise.com Prepared On March 20, 2013 TABLE OF CONTENTS Introduction
More informationChallenges in Storage Systems: A NetApp perspective
Tag line, tag line Challenges in Storage Systems: A NetApp perspective Deepak Kenchammana-Hosekote Advanced Technology Group NetApp Agenda What we do (context) What we see happening (trends) What we are
More informationHP NonStop Volume Level Encryption with DataFort
HP NonStop Volume Level Encryption with DataFort Agenda About NetApp Storage Security Background Introduction to DataFort Focus on Key Management About NetApp Delivering Customer Success $3.0B $2.0B $1B
More informationSarbanes-Oxley Act (SOX)
Sarbanes-Oxley Act (SOX) Introduction The Sarbanes-Oxley (SOX) Act was introduced in 2002 to protect shareholders and the general public from fraudulent accounting activities by bringing greater accountability
More informationOracle Database Vault
An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command
More informationIT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com
IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : NS0-102 Title : NetApp(ASAP) Accredited Storage Architect Professional Version : DEMO 1 / 7 1. Which
More informationCompliance and Privileged Password Management
Introduces Compliance and Privileged Password Management [ W H I T E P A P E R ] Written by Kris Zupan, CEO/CTO e-dmz Security, LLC April 13, 2007 Compliance and Privileged Password Management Overview
More informationGet More Out of Storage with Data Domain Deduplication Storage Systems
1 Get More Out of Storage with Data Domain Deduplication Storage Systems David M. Auslander Sales Director, New England / Eastern Canada 2 EMC Data Domain Dedupe everything without changing anything Simplify
More informationSARBANES-OXLEY (SOX) ACT
SARBANES-OXLEY (SOX) ACT Table of Contents Introduction 03 Who is affected by SOX? 05 Why should my organization 05 comply with SOX? What does SOX require for email 06 compliance? How can my organization
More informationIBM System Storage N3000 Express series Modular Disk Storage Systems
Advanced system designed to enable outstanding, cost-effective deployment versatility IBM System Storage N3000 Express series Modular Disk Storage Systems Highlights High availability Takes Simple replication
More informationDynamic Storage Using IBM System Storage N series
Dynamic Storage Using IBM System Storage N series Javier Suarez e-techservices A dynamic infrastructure addresses today s challenges and tomorrow s opportunities. IMPROVE SERVICE Not only ensuring high
More informationHP Storage Software Solutions
HP Storage Software Solutions SRM Focus: HP Storage Essentials Ali Mustakim Enterprise Storage Consultant 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change
More informationSQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY
SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.
More informationBalakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.
Balakrishnan Nair Senior Technology Consultant Back Up & Recovery Systems South Gulf 1 Thinking Fast: The World s Fastest Backup Now Does Archive Too Introducing the New EMC Backup and Recovery Solutions
More informationIBM System Storage Data Protection and Security Chen Chee Khye ATS Storage
IBM System Storage Data Protection and Security Chen Chee Khye ATS Storage chenck@my.ibm.com Information is Exploding Data Types Data Growth Data Impact Structured PB shipped 1TB/4D image Unstructured
More informationEMC Data Domain for Archiving Are You Kidding?
EMC Data Domain for Archiving Are You Kidding? Bill Roth / Bob Spurzem EMC EMC 1 Agenda EMC Introduction Data Domain Enterprise Vault Integration Data Domain NetBackup Integration Q & A EMC 2 EMC Introduction
More informationContent Addressed Storage (CAS)
Content Addressed Storage (CAS) Module 3.5 2006 EMC Corporation. All rights reserved. Content Addressed Storage (CAS) - 1 Content Addressed Storage (CAS) Upon completion of this module, you will be able
More informationArchive and Compliance Management Guide For 7-Mode
Updated for 8.2.1 Data ONTAP 8.2 Archive and Compliance Management Guide For 7-Mode NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
More informationTape Sucks for Long-Term Retention Time to Move to the Cloud. How Cloud is Transforming Legacy Data Strategies
Tape Sucks for Long-Term Retention Time to Move to the Cloud How Cloud is Transforming Legacy Data Strategies INTRODUCTION Tapes suck for long term retention (LTR) Unknown content Locked in proprietary
More informationInformation Lifecycle Management for Business Data. An Oracle White Paper September 2005
Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...
More informationFile System Archival with Symantec Enterprise Vault and NetApp Storage Solution
File System Archival with Symantec Enterprise Vault and NetApp Storage Solution Gangoor Sridhara, NetApp TR-3383 Abstract In addition to e-mail archival, file system archival offers a new feature to archive
More informationComplete document security
DOCUMENT SECURITY Complete document security Protect your valuable data at every stage of your workflow Toshiba Security Solutions DOCUMENT SECURITY Without a doubt, security is one of the most important
More informationRethink Storage: The Next Generation Of Scale- Out NAS
Rethink Storage: The Next Generation Of Scale- Out NAS Norbert Funke EMEA Product Marketing Manager, EMC Isilon 1 Agenda EMC Isilon Momentum What Is The Difference? EMC Isilon Versus Traditional Architectures
More informationOptim. Optim Solutions for Data Governance. R. Kudžma Information management technical sales
Optim Solutions for Data Governance R. Kudžma Information management technical sales kudzma@lt.ibm.com IBM Software Group 10/23/2009 2008 IBM Corporation What is Data Governance Data Governance is the
More informationSecure Messaging is far more than traditional encryption.
Resellers Secure Messaging TM Secure Messaging Secure Messaging is far more than traditional encryption. It s an easy-to-use encryption and message control platform that empowers greater communication,
More informationNetApp Solutions for Oracle
NetApp Solutions for Oracle for BCCServices HROUG, Rovinj Oct. 19th 2007 Bernd Dultinger Sales Manager Eastern Europe Agenda NetApp and Oracle Partnership NetApp and Oracle Highlights NetApp Solutions
More informationEMC DATA DOMAIN PRODUCT OvERvIEW
EMC DATA DOMAIN PRODUCT OvERvIEW Deduplication storage for next-generation backup and archive Essentials Scalable Deduplication Fast, inline deduplication Provides up to 65 PBs of logical storage for long-term
More informationIBM IBM Storage Sales Version 8. Practice Test. Version QQ:
IBM 000-748 000-748 IBM Storage Sales Version 8 Practice Test Version 1.1 QUESTION NO: 1 A new video application is being added to a Windows Server that is already SAN Connected. The current SAN needs
More informationHIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards
HIPAA Compliance HIPAA and 164.308(a)(7)(ii) Administrative Safeguards FileGenius is compliant with all of the below. First, our data center locations (DataPipe) are fully HIPAA compliant, in the context
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationArchive 7.0 for File Systems and NAS
DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Archive 7.0 for File Systems and NAS Optimize Storage Resources, Automate Data Management and Improve Operational Efficiencies Key u Expand
More informationOracle Backup and Recovery with NetApp Storage. Klaus Wagner Solution Architect
Oracle Backup and Recovery with NetApp Storage Klaus Wagner Solution Architect Challenge: Expensive Backup and Restore Windows Time to Backup Time to Recover To Tape From Tape Redo Logs Performance degraded
More informationSAFEGUARD INFORMATION AND ENSURE AVAILABILITY WITH THE NETAPP BACKUP AND RECOVERY SOLUTION
enterprise storage solutions SAFEGUARD INFORMATION AND ENSURE AVAILABILITY WITH THE NETAPP BACKUP AND RECOVERY SOLUTION backup and recovery solution Network Appliance unleashes the full potential of disk-based
More informationDatabase Centric Information Security. Speaker Name / Title
Database Centric Information Security Speaker Name / Title The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationDelivering Real Business Value While Driving Down IT Cost with Virtual Tape
Delivering Real Business Value While Driving Down IT Cost with Virtual Tape Piotr Polanowski Oracle Corporation March 2, 2011 Session Number 9017 Agenda Data trends and drivers Data classification and
More informationPolicy. Sensitive Information. Credit Card, Social Security, Employee, and Customer Data Version 3.4
Policy Sensitive Information Version 3.4 Table of Contents Sensitive Information Policy -... 2 Overview... 2 Policy... 2 PCI... 3 HIPAA... 3 Gramm-Leach-Bliley (Financial Services Modernization Act of
More informationSolving the long term archiving and retrieval challenges with IBM Information Archive
Solving the long term archiving and retrieval challenges with IBM Information Archive White Paper Nils Haustein, Consulting IT Specialist, IBM European Storage Competence Center April 2011, Document Version
More informationCipherpost Pro is far more than traditional encryption.
Resellers Cipherpost Pro TM Secure Messaging Cipherpost Pro is far more than traditional encryption. It s an easy-to-use secure messaging and information management platform that empowers greater communication,
More informationIBM N Series. Store the maximum amount of data for the lowest possible cost. Matthias Rettl Systems Engineer NetApp Austria GmbH IBM Corporation
IBM N Series Store the maximum amount of data for the lowest possible cost Matthias Rettl Systems Engineer NetApp Austria GmbH. Agenda Challenges and Concerns Increasing Efficiency - How We Do It The Net
More informationInfinite Volumes Management Guide
ONTAP 9 Infinite Volumes Management Guide September 2016 215-11160_B0 doccomments@netapp.com Visit the new ONTAP 9 Documentation Center: docs.netapp.com/ontap-9/index.jsp Table of Contents 3 Contents
More informationOracle Secure Backup 12.1 Technical Overview
Oracle Secure Backup 12.1 Technical Overview February 12, 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationUpgrade Strategies for Oracle E-Business: Leveraging Archiving Best Practices
Upgrade Strategies for Oracle E-Business: Leveraging Archiving Best Practices Cynthia Babb Product Marketing Manager - Optim TM ERP Solutions Dhan Patel Technical Product Manager Optim TM E-Business Solution
More informationBoost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA
Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3
More informationHitachi Content Archive Platform
S O L U T I O N S B R I E F Hitachi Content Archive Platform An Active Archive Platform for the Long Term Preservation, Optimization and Discovery of Unstructured Business Critical Digital Content Hitachi
More informationPower of the Portfolio. Copyright 2012 EMC Corporation. All rights reserved.
Power of the Portfolio 1 VMAX / VPLEX K-12 School System District seeking system to support rollout of new VDI implementation Customer found Vblock to be superior solutions versus competitor Customer expanded
More informationAdministration and Data Retention. Best Practices for Systems Management
Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices
More informationYou Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.
April 14, 2016 You Might Know Us As. 2012 2014 2 TierPoint Corporate Overview TierPoint Data Center Footprint* TierPoint Key Statistics Employees: 870 Markets: 24 Data Centers: 38 Total Raised Floor: 599,000
More informationBEST PRACTICES GUIDE FOR DATA PROTECTION WITH FILERS RUNNING FCP
BEST PRACTICES GUIDE FOR DATA PROTECTION WITH FILERS RUNNING FCP Nick Wilhelm-Olsen, Brett Cooper October 1, 2002 TR3202 TECHNICAL REPORT Network Appliance, a pioneer and industry leader in data storage
More informationData Archiving Using Enhanced MAID
Data Archiving Using Enhanced MAID Aloke Guha COPAN Systems Inc. aloke.guha@copansys.com Abstract * This paper discusses archive data and its specific attributes, as well as the requirements for storing,
More informationCTA and CTA/VE 10.0 SP3 Interoperability Matrix EMC Part Number = Rev.09
CTA and CTA/VE 10.0 SP3 Interoperability Matrix EMC Part Number = 300-014-320 Rev.09 Last Revised: April 2015 This document provides interoperability information intended for use as a reference guide in
More informationSATA RAID For The Enterprise? Presented at the THIC Meeting at the Sony Auditorium, 3300 Zanker Rd, San Jose CA April 19-20,2005
Logo of Your organization SATA RAID For The Enterprise? Scott K. Cleland, Director of Marketing AMCC 455 West Maude Ave., Sunnyvale, CA 94085-3517 Phone:+1-408-523-1079 FAX: +1-408-523-1001 E-mail: scleland@amcc.com
More informationUpdate on SAM-QFS: Features, Solutions, Roadmap. Michael Selway Sr. Consultant Engineer ILM Software Sales Sun Microsystems Sun.
Update on SAM-QFS: Features, Solutions, Roadmap Michael Selway Sr. Consultant Engineer ILM Software Sales Sun Microsystems Mike.Selway@ Sun.COM What SAM-{Q}FS is Access Direct ftp NFS SAMBA RCP SSH RPC
More informationData-at-Rest Encryption Addresses SAN Security Requirements
Data-at-Rest Encryption Addresses SAN QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs QLogic Fibre Channel Adapters from Cavium provide a secure solution that works well with SEDs
More informationThe NetBackup catalog resides on the disk of the NetBackup master server. The catalog consists of the following parts:
What is a NetBackup catalog? NetBackup catalogs are the internal databases that contain information about NetBackup backups and configuration. Backup information includes records of the files that have
More informationProvisioning with SUSE Enterprise Storage. Nyers Gábor Trainer &
Provisioning with SUSE Enterprise Storage Nyers Gábor Trainer & Consultant @Trebut gnyers@trebut.com Managing storage growth and costs of the software-defined datacenter PRESENT Easily scale and manage
More informationCost savings of disk-based backup using a Dell PowerVault DL Backup to Disk Appliance powered by Symantec Backup Exec 2010 R2 vs.
Cost savings of disk-based backup using a Dell PowerVault DL Backup to Disk Appliance powered by Symantec Backup Exec 2010 R2 vs. tape-based backup Executive summary Disk-based backup offers both cost
More informationGramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.
Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule
More informationNETAPP - Accelerated NCDA Boot Camp Data ONTAP 7-Mode
NETAPP - Accelerated NCDA Boot Camp Data ONTAP 7-Mode Duration: 5 Days Course Price: $5,850 Course Description Course Overview This training course is a 5-day boot camp with extended hours. The training
More informationAvailability for the Modern Data Center on FlexPod Introduction NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Availability for the Modern Data Center on FlexPod Introduction 2014 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only Abstract Veeam Availability Suite v8 leverages NetApp storage
More informationDon t just manage your documents. Mobilize them!
Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.
More informationXcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5
TECHNOLOGY BRIEF Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5 ABSTRACT Xcellis represents the culmination of over 15 years of file system and data management
More informationNAS When, Why and How?
NAS When, Why and How? Ian Duncan WW NAS Marketing Manager Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice NAS When,
More informationMeeting Today s Enterprise Storage Challenges: A Better Backup and Recovery Solution
Meeting Today s Enterprise Storage Challenges: A Better Backup and Recovery Solution A Better Backup and Recovery Solution Challenges Facing Enterprise Storage Environments Today Technological progress
More informationOptimizing and Managing File Storage in Windows Environments
Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 31 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationInformation Infrastructure Forum
Information Infrastructure Forum, Istanbul Information Infrastructure Forum Swissotel the Bosphorus, Đstanbul 2010 IBM Corporation Information Infrastructure Forum, Istanbul IBM Information Archieve ile
More informationEffizientes Speichern von Cold-Data
Effizientes Speichern von Cold-Data Dr. Dirk Gebh Storage Sales Consultant Oracle Deutschland Program Agenda 1 2 3 4 5 Cold-Data OHSM Introduction Use Case Removing Cold Data from Primary Storage OHSM
More informationCloud-enable your NetApp Storage with EgnytePlus File Sharing Infrastructure
w w w. e g n y t e. c o m Cloud-enable your NetApp Storage with EgnytePlus File Sharing Infrastructure White Paper Revised Dec 30, 2012 Table of Contents Cloud Storage 3 File Sharing and Collaboration
More informationStorage Made Easy. SoftLayer
Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on
More informationOverview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving
EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury
More informationEnabling Information Lifecycle Management Today
2007 Nexsan Technologies Inc. All Rights Reserved. Published by Nexsan Technologies Inc. 21700 Oxnard Street, Suite 1850 Woodland Hills, CA 91367 USA www.nexsan.com No part of this document may be reproduced
More informationAspects of Information Lifecycle Management
Oxford University TSM Symposium 2005 Tivoli Storage Manager : Facing the Future St Catherine's College, 27-29 September 2005 IBM TotalStorage Software Aspects of Information Lifecycle Management TSM and
More informationCopyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.
1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than
More informationWHITE PAPER. Iron Mountain Delivers File Archiving Service. By Brian Babineau With Lauren Whitehouse. February, 2009
WHITE PAPER Iron Mountain Delivers File Archiving Service By Brian Babineau With Lauren Whitehouse February, 2009 Table of Contents ESG WHITE PAPER Table of Contents... i Introduction... 1 Why Archive
More informationOracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security
Oracle Audit Vault Trust-but-Verify for Enterprise Databases Tammy Bednar Sr. Principal Product Manager Oracle Database Security Agenda Business Drivers Audit Vault Overview Audit
More informationDELL EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE
WHITEPAPER DELL EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE A Detailed Review ABSTRACT This white paper introduces Dell EMC Data Domain Extended Retention software that increases the storage scalability
More informationCOMPREHENSIVE RETENTION COMPLIANCE: HOW KEEPITSAFE ONLINE BACKUP CAN HELP YOUR BUSINESS
COMPREHENSIVE RETENTION COMPLIANCE: HOW KEEPITSAFE ONLINE BACKUP CAN HELP YOUR BUSINESS Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster
More informationDataONTAP8.1Archiveand Compliance Management Guide For 7-Mode
IBM System Storage N series DataONTAP8.1Archiveand Compliance Management Guide For 7-Mode GA32-1033-02 Table of Contents 3 Contents Preface... 9 About this guide... 9 Supported features... 9 Websites...
More informationVeritas Scalable File Server (SFS) Solution Brief for Energy (Oil and Gas) Industry
Veritas Scalable File Server (SFS) Solution Brief for Energy (Oil and Gas) Industry By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC) September
More informationMySQL Enterprise Security
MySQL Enterprise Security Mike Frank Product Management Director Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,
More informationHP StorageWorks LTO-5 Ultrium tape portfolio
HP StorageWorks LTO-5 Ultrium tape portfolio Business white paper the gap between your current tape infrastructure capability and today s business demands. Table of contents Executive summary.............................................
More informationData Security: Public Contracts and the Cloud
Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?
More informationHIPAA Compliance & Privacy What You Need to Know Now
HIPAA Email Compliance & Privacy What You Need to Know Now Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry
More informationNetApp Data Compression and Deduplication Deployment and Implementation Guide
Technical Report NetApp Data Compression and Deduplication Deployment and Implementation Guide Data ONTAP 8.1 and 8.2 Operating in 7-Mode Sandra Moulton, Carlos Alvarez, NetApp February 2014 TR-3958 Abstract
More informationproduct overview CRASH
product overview CRASH e back up everyone, everywhere PROe Software Continuous backup for business Use CrashPlan PROe for continuous, cross-platform backup that works everywhere, enabling users to easily
More informationStorage Security Best Practices Martin Borrett, Lead Security Architect NE Europe, WW Tivoli Tiger Team IBM Corporation
Storage Security Best Practices Martin Borrett, Lead Security Architect NE Europe, WW Tivoli Tiger Team 2009 IBM Corporation Agenda What are the threats to your information and business? What are the best
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationWhite paper. Usage Trends for Flash Storage with Epic
White paper Usage Trends for Flash Storage with Epic 1. Introduction This white paper presents: The benefits of an all-flash data center on a single, unified operating system How to reduce the time that
More informationSymantec Backup Exec Blueprints
Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints
More informationIBM Internet Security Systems October Market Intelligence Brief
IBM Internet Security Systems October 2007 Market Intelligence Brief Page 1 Contents 1 All About AIX : Security for IBM AIX 1 AIX Adoption Rates 2 Security Benefits within AIX 3 Benefits of RealSecure
More informationGlobalSearch Security Definition Guide
Prepared by: Marketing Square 9 Softworks 203-361-3471 127 Church Street, New Haven, CT 06510 O: (203) 789-0889 E: sales@square-9.com www.square-9.com Table of Contents GLOBALSEARCH SECURITY METHODS...
More informationQuest DR Series Disk Backup Appliances
Quest DR Series Disk Backup Appliances Back up more. Store less. Perform better. Keeping up with the volume of data to protect can be complex and time consuming, but managing the storage of that data doesn
More information