White paper. Storing More Intelligently: Tiered Storage Solutions for Security Data
|
|
- Augustus Hudson
- 8 years ago
- Views:
Transcription
1 White paper Storing More Intelligently: Tiered Storage Solutions for Security Data
2 Until recently, storage management has been the purview of IT staff, not compliance or security professionals. But as volumes of security information such as logs and other operational data continue to grow, security and compliance teams face growing challenges around storage management. Compliance and security organizations are beginning to realize that security information must be managed in order to maximize the value of data while minimizing the costs of storing it. Fortunately, there are proven strategies and solutions for optimizing costs, performance, and functionality, and such solutions can be readily applied to the management of security information. Contents I. The Growth in Security Data page 1 II. The Need for a Strategic Approach page 1 III. The Lifecycle of Security Data page 2 IV. Implementing Tiered Storage Solutions page 2 V. EMC Tiered Storage Solutions page 4 VI. Conclusion page 6 VII. Solutions for Implementing Best Practices page 6
3 I. The Growth in Security Data II. The Need for a Strategic Approach The Enterprise Strategy Group predicts that security data will grow at a compound annual growth rate of 58 percent over the next five years. 1 What s driving this growth? As compliance and security professionals know, there are three primary reasons. 1. Companies are collecting more security data from more systems. Increasingly, organizations are collecting security data from the entire IT environment. In the past, security teams focused on collecting logs from intrusion detection systems (IDS), routers, and virtual private networks (VPN) or firewalls. Today, they re focused on the security and activity of all of those network components plus commercially developed and homegrown applications, operating systems, database systems, storage devices, servers, and more. 2. Companies have more uses for security data. Evolving threats combined with complex and ever-changing regulatory requirements mean organizations must retain security data for more purposes than ever before. Organizations are leveraging security data to detect malicious code in real time; perform real-time monitoring or access control; detect unauthorized services; reduce false positives; and report on SLA compliance, among other things. These increasing uses of security data have made data storage and management a major concern for executives in security, compliance, and risk management and for leaders throughout IT, including the desktop, server, and application teams. 3. Companies are facing growing regulatory requirements and industry guidelines. Security professionals are well aware of the regulations and industry standards they face including the Sarbanes-Oxley Act, the Payment Card Industry (PCI) requirements, Basel II and Gramm-Leach- Bliley for financial services, and HIPAA for healthcare entities, as well as increasingly rigorous state-level mandates. And more regulations are on the horizon. Such regulations require organizations to implement policies, processes, and practices to protect the security and privacy of critical information. Furthermore, in many cases, organizations must also be able to validate the effectiveness of what they ve implemented. To do all of that, organizations must capture and manage very large quantities of security data. Virtually all organizations are under competitive pressures to maximize performance of their IT environments and optimize information access while minimizing costs for capital investments and day-to-day operations. Given those pressures, simply adding more storage for security data is no longer an adequate approach. In reality, however, many organizations have addressed the explosive growth of both business and security data by doing just that. They have deployed scaled solutions that is, piecemeal collections of storage subsystems added over time. Complex and costly to manage, such solutions often result in inappropriate resource deployment that leads to misused capacity, degraded performance and availability, inadequate security for servers and applications, and premature investments in new subsystems. To avoid those pitfalls, many organizations are employing Information Lifecycle Management (ILM) strategies. ILM is a strategy for aligning the business value and/or use model of security and other data with the most appropriate and cost-effective infrastructure throughout its existence. Through an ILM strategy, organizations are empowered to understand the changing value and use requirements of their information over time and then deploy storage resources accordingly. The ultimate result: more effective management of information and storage resources that maximizes the value of the information while minimizing costs. While Information Lifecycle Management is the overarching strategy for maximizing the efficiency and effectiveness of a storage infrastructure, tiered storage is a foundational element for executing on that strategy and, ultimately, storing more intelligently. Before identifying specific strategies for tiering security data and storage systems, it s important to first understand the phases of the security information lifecycle. 1 Security Information Lifecycle: Data Retention of Event Logs for Compliance, Enterprise Strategy Group, August RSA White Paper 1
4 Figure 1. Security Information Lifecycle Management About One Year + One Audit Cycle Retention Policy Capture Compress Secure Store Retain Retire The Lifecycle of Security Log Data III. The Lifecycle of Security Data Just like virtually all business information, security data has a very clear lifecycle. As illustrated in Figure 1, first it s collected, compressed and protected. It is then stored as defined by the organization s log retention policies. And, finally, it is retired in compliance with regulatory and/or company guidelines. IV. Implementing Tiered Storage Solutions Five Steps to Tiered Storage for Security 1. Classify security data in preparation to deploy tiered storage 2. Plan for and deploy online storage 3. Create an active archive 4. Streamline backup and recovery processes 5. Retire (and delete) data This paper has discussed the significant growth of and need for security data, as well as the associated information management challenges. Now it answers the question: How can an organization transform tiered storage for security from concept to reality? The following five steps are recommended to go from storing more security data to storing this data more intelligently. 1. Classify security data in preparation to deploy tiered storage. The first step to storing more intelligently is to classify security data based on an organization s security objectives, policies/procedures, and applicable regulatory requirements. This classification exercise will provide insight into the purpose of the data throughout its lifecycle and will help identify the storage infrastructure requirements to support that data over time. From there, deploying and leveraging a tiered storage infrastructure allows an organization to store security data on the right storage type at the right time, thereby aligning capabilities to requirements and ultimately lowering total cost of ownership (TCO). In this context, the right storage type refers to underlying capabilities of the storage environment, such as access times, high availability, disaster recovery, and other functional requirements. The right time typically refers to the stage of the lifecycle and/or the specific purpose for the data at that point in time. As one might assume, different capabilities are typically required as the data ages and progresses throughout its lifecycle. By classifying data and deploying tiered storage, organizations typically see a 25% improvement in TCO. For example, many companies keep the majority of their data on tier-one storage. After classifying their data, they often discover that they are using storage resources with capabilities that far exceed what their data requires. From there, they can deploy different tiers of storage and migrate less-critical and/or less-sensitive data to a tier of storage that offers the right set of capabilities at the right cost-point. 2 RSA White Paper
5 There are three primary levels of tiered storage for storing security data. a) Production Online storage offers high-performance characteristics and a wide spectrum of software capabilities to meet production data requirements (that is, data actively being used for real-time analysis, on-going review, and periodic audits and assessments). Security data is likely to be stored in production for one year or more to support one year of log data plus one audit cycle (depending on the organization s policies). Production storage offers software capabilities to ensure that the data is protected and always available; it also facilitates fast and frequent access to the data to establish baselines and perform real-time and forensic analysis and to support required audit cycles. b) Archive Archive storage offers medium performance characteristics and lower cost/megabyte to support medium access times. Based on each organization s retention policy, security data should be migrated to archive storage to reduce the cost of storing high volumes of data that are not accessed as frequently as production data, or that don t require fast response time. Archive storage supports security data retention and archival management in compliance with applicable regulatory requirements. It also facilitates easy access to security data for longer-term forensic analysis, audits, and other critical activities. Migrating data from online to archive storage should help drive efficiencies and cost-effectiveness while continuing to support an organization s security requirements. c) Backup Backup media is used to store data so that in the event that the production data becomes compromised or damaged, the information can be recovered. Offline storage is either disk or tape-based, and usually requires mounting of the media type for backup/recovery operations. And as expected, the performance characteristics vary greatly depending on whether it s a tape or disk-based solution. 2. Plan for and deploy online storage. Identify the online storage capacity required to support online log retention policies. Online storage with the right performance, availability, and data protection characteristics is critical to supporting day-to-day, real-time and forensic analysis, as well as periodic audits based on regulations and internal policies. 3. Create an active archive. The third step is to deploy an active archive for security data to support an organization s archive policy. The policy could be as simple as archiving data based on age or frequency of use, or it could be much more complex and based on a myriad of factors. Whatever the policy, a key criterion of an active archive is that when the information is needed, it is available online and readily accessed to support ad-hoc requests or longer-term audit cycles. (Such data can be identified during the classification process in the previous step.) Hence, the term active archive ; data is archived yet remains available online and can be accessed relatively quickly via a costeffective storage solution. Another characteristic or requirement is to assure content authenticity since certain security data must not change to comply with regulatory requirements. An active archive offers numerous benefits: Because the archive is available online, information can move from production storage to the archive. This creates a virtually infinite repository of information. It also frees up production storage for high-priority critical data, including logs used for real-time, short-term, and medium-term analysis and reporting. Archived information is taken out of the production storage backup cycle. This results in dramatic improvements to backup times and backup media costs. Operational recovery and/or disaster recovery (DR) plans to support critical data become much more efficient as there is less production information to recover, i.e., the archived information is in the archive, protected by its own protection scheme. Finally, in one solution, the active archive can provide the speed of disk with the authenticity of optical, which makes complying with regulation requirements much easier. RSA White Paper 3
6 4. Streamline backup and recovery processes. This step is a natural outgrowth of the previous steps. By deploying online and active archive tiers, an organization can dramatically improve backup times and efficiency. However, the sole purpose of backing up critical data is to be able to recover that data when needed. Backing up such data on high-capacity, low-cost disk solutions, rather than tape, delivers five-fold improvement in backup and recovery times. It also offers significant reliability improvements to ensure that security data can be recovered quickly and easily when needed. 5. Retire (and delete) data no longer required for production or for compliance requirements. The final step in storing more intelligently is to retire (and delete) security data when it is no longer needed or when regulations require its retirement. V. EMC Tiered Storage Solutions EMC has a continuum of scalable, easy-to-use storage solutions to address every phase of the security data lifecycle. The portfolio spans from high-end storage solutions that offer maximum performance, availability, and protection to cost-effective midrange solutions designed to accommodate the needs of smaller organizations managing security data. EMC s storage portfolio includes EMC Symmetrix, EMC CLARiiON, EMC Celerra, EMC Centera, and EMC Disk Library platforms. Across the platforms are hardware and software options that allow the configuration and delivery of the required capabilities at the right cost. In addition, EMC storage platforms can be deployed with a combination of high performance Fibre Channel drives and low-cost/high capacity drives within the same array. Whether an organization requires a small-scale solution with tiered storage deployed within one physical system or has a large-scale environment where multiple tiers of storage systems are needed, the ultimate benefits are the same: lower TCO, energy efficiency advantages, simplified information management, and improved ability to exploit data for business protection and advantage. EMC Symmetrix DMX one of the world s most trusted storage platforms The market-leading EMC Symmetrix DMX-3 enterprise storage platform provides uncompromising levels of service for the most demanding enterprise environments. DMX-3 systems will scale to more than one petabyte of data, which meets even the most aggressive growth requirements. By leveraging advanced technology from its RSA security division, EMC has built strong authentication, authorization, and enhanced audit capabilities into Symmetrix that further secure customers information infrastructures. Symmetrix DMX tiered storage capabilities include: Information Availability one of the most advanced and widely deployed business continuity platform. Tiered Storage Consolidation save money through in-the-box tiering. Performance supports the world s most demanding application workloads. Application integration and qualification longer relationships and deeper integration with applications and ISVs. Power efficiency best power and cooling efficiency for today s data center requirements. Information-Centric Security, Built In advanced security and integrated RSA technology. EMC Celerra NS Series an industry-leading IP storage platform The EMC Celerra IP storage systems offer industry-leading price/performance with no-compromise availability for combined storage and file server consolidation. EMC Celerra delivers a comprehensive set of software features at no additional cost and simplifies management via an intuitive web interface. Celerra NS series tiered storage capabilities include: Ability to deploy multiple tiers of storage media within the same system. High-performance Fibre Channel drives support mission-critical tiers while low-cost/high capacity drives can offer the right choice for lower-tier data and backup/recovery operations. Integrated NAS and iscsi protocols for IP connectivity, with the option to add Fibre Channel connectivity. 4 RSA White Paper
7 EMC Celerra FileMover for automated, policy-based file movement to and from secondary storage platforms, such as EMC CLARiiON or EMC Centera. EMC CLARiiON CX3 UltraScale Series a proven midrange storage solution The EMC CLARiiON CX3 UltraScale series offers exceptional price/performance providing an excellent solution for cost-effective storage consolidation. The EMC CLARiiON CX3 delivers simple management tools, five 9s availability, industry-leading price/performance, data mobility, and scalability between multiple storage tiers. CLARiiON CX3 UltraScale series tiered storage capabilities include: Five 9s Availability unique high availability and data integrity features Price/Performance the best performance and price/performance in midrange storage Data Mobility nondisruptive in-the-box mobility and heterogeneous data migrations Best Economics most economical midrange platform through the entire lifecycle Ease of Use easy for customers and partners to install, manage, and scale EMC Centera one of the most simple, affordable, and secure archiving platforms EMC Centera meets the unique requirements of storing and managing fixed content that is, unchanging digital assets into an active archive storage solution. A Future Proof Investment eliminates the impacts of technology obsolescence. Simple Scalability seamlessly add capacity without disruption. Lowest TCO more cost effective than tape or optical. EMC Disk Library an easy way to improve backup and restore EMC Disk Library is a simple to deploy and easy to use diskbased backup and recovery solution. As the industry s most widely deployed open systems virtual tape solution, the Disk Library emulates leading open systems tape libraries; however, it leverages disk drive media for extremely fast and reliable backup and recovery operations. Since the Disk Library looks like tape to the backup application, it offers immediate compatibility with existing backup applications and a quick and simple deployment. The EMC Disk Library capabilities include: Industry-leading Open Systems Disk Library more than 100 petabytes deployed in two years Most Qualified Backup Environments more than 3 million supported configurations The First Disk Library with Consolidated Media Management EMC NetWorker and Symantec NetBackup functions performed within EMC Disk Library Highest Performance highest VTL-system performance available today EMC Centera tiered storage capabilities include Assured Authenticity and Online Access Speed of disk, with the authenticity of optical at the price of tape. Single Instance Storage only one copy of information is kept no matter how many times it is requested to be stored. Self-Configuring, Self-Healing and Self-Managing administrators can manage up to 50 times greater quantity of content. RSA White Paper 5
8 VI. Conclusion VII. Solutions for Implementing Best Practices Corporations that are automating compliance procedures must look ahead several years to architect for the entire security information lifecycle. This includes procedures for assuring the authenticity of data in storage, archiving data to secondary storage, and security information deletion at the end of the lifecycle, wrote Security Analyst Eric Ogren of Enterprise Strategy Group. 2 Furthermore, Gartner has asserted that the majority of security event information management (SIEM) deployment failures occur because organizations improperly assess data volumes and the resulting scalability issues. 3 The challenges now facing security and compliance experts are familiar to storage managers, who recognize tiered storage as a proven approach to storing more intelligently. As they grapple with a veritable explosion of security data, security and compliance managers can discover for themselves the very real benefits of storing more intelligently through tiered storage strategies and solutions. By aligning resources to information value and use, the most critical and current security data can be maintained and protected on highly available, high-performance storage, while data that s no longer current can be retained on more cost-effective storage resources. With the proper software functionality, security data can be efficiently and effectively migrated from one system to another. And when solutions incorporate easy-to-use tools, organizations can prevent people and storage management costs from rising at the same rate as security data volumes. The ultimate result: a cost-effective, easy-to-manage storage solution suitable for meeting a wide range of compliance and security operations requirements. To implement best practices, RSA provides end-to-end solutions for building a centrally-managed dedicated infrastructure. RSA envision security information and event management (SIEM) platform aggregates event logs from across the enterprise, and turns this information into actionable compliance and security intelligence. By combining RSA envision with networked storage solutions, organizations can manage the entire lifecycle of security information using a tiered storage approach, whereby logs are stored on different storage resources based on the age of and need for the data. The RSA envision platform works seamlessly with EMC Celerra, Clariion, Symmetrix, and Centera storage for an end-to-end solution in security information lifecycle management. This solution enables organizations to manage huge volumes of logged data from creation to deletion in order to meet regulatory compliance, security operations, and business requirements. For more information on RSA envision, please go to For more information on EMC s storage solutions including EMC Celerra, Clariion, Symmetrix and Centera, please go to 2 Enterprise Strategy Group, Security Information Lifecycle: Data Retention of Event Logs for Compliance, April Gartner, Evaluating & Deploying SIEM Technologies. RSA, envision and the RSA logo are registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. EMC, Celerra, Centera, Symmetrix and CLARiiON are registered trademarks or trademarks of EMC Corporation. All other products or services mentioned are trademarks of their respective owners RSA Security Inc. All rights reserved. TS WP
Six approaches to storing more intelligently.
Six approaches to storing more intelligently. PMS 130 PMS 711 PMS 368 0, 20, 100, 0 3, 95, 82, 0 57, 0, 100, 0 PMS 294 100, 50, 0, 21 Black 0, 0, 0, 100 0, 0, 100, 0 0, 61, 97, 0 PMS 2573 75, 0, 7, 0 PMS
More informationBackup-to-Disk Building an Effective Long-Term Strategy
Backup-to-Disk Building an Effective Long-Term Strategy Technology Concepts and Business Considerations Abstract This white paper outlines benefits and options available to gain long-term business value
More informationPacific Life Insurance Company
Pacific Life Insurance Company Pacific Life Turns Compliance into Business Advantage SOLUTION SNAPSHOT Applications: SAP, Oracle, Microsoft Exchange, Microsoft SQL Server, KVS, FileNet EMC Software: EMCControlCenter
More informationCisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
More informationBackup to Disk: Building a Long Term Solution September 2004
Backup To Disk: Building an Effective Long Term Solution 1 Agenda Conditions driving demand for B2D solutions B2D as part of a enterprise-wide data protection strategy covering a broad range of backup
More informationRSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
More informationSecurity Information Lifecycle
Security Information Lifecycle By Eric Ogren Security Analyst, April 2006 Copyright 2006. The, Inc. All Rights Reserved. Table of Contents Executive Summary...2 Figure 1... 2 The Compliance Climate...4
More informationEMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, 16.10.2008. Copyright 2008 EMC Corporation. All rights reserved.
EMC arhiviranje Lilijana Pelko Primož Golob Sarajevo, 16.10.2008 1 Agenda EMC Today Reasons to archive EMC Centera EMC EmailXtender EMC DiskXtender Use cases 2 EMC Strategic Acquisitions: Strengthen and
More informationRSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief
RSA Solution Brief RSA envision Compliance and Security Information Management Platform RSA Solution Brief Actionable Compliance and Security Intelligence RSA envision technology is an information management
More informationPreemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationLeveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
More informationMicrosoft SQL Server 2005 on Windows Server 2003
EMC Backup and Recovery for SAP Microsoft SQL Server 2005 on Windows Server 2003 Enabled by EMC CLARiiON CX3, EMC Disk Library, EMC Replication Manager, EMC NetWorker, and Symantec Veritas NetBackup Reference
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationEMC Business Continuity for Microsoft SQL Server 2008
EMC Business Continuity for Microsoft SQL Server 2008 Enabled by EMC Celerra Fibre Channel, EMC MirrorView, VMware Site Recovery Manager, and VMware vsphere 4 Reference Architecture Copyright 2009, 2010
More informationSecurity Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success
Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success Copyright 2008 EMC Corporation. All rights reserved.
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationAcme Corporation Enterprise Storage Assessment Prepared by:
Acme Corporation Enterprise Storage Assessment Prepared by: Rocket Software, Inc. 150 N. Mathilda Place, Suite 304 Sunnyvale, CA 94086 USA Tel# +1.650.237.6100 / Fax# +1.650.237.9183 Table of Contents
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More informationEDS Storage Services Building on the EDS Agility Alliances. Shuky Peleg Solution Development EDS Israel December 5 th, 2006
EDS Storage Services Building on the EDS Agility Alliances Shuky Peleg Solution Development EDS Israel December 5 th, 2006 Our Alliances Ensures delivery of best in class solutions Drives IT service innovation
More informationIBM Global Technology Services September 2007. NAS systems scale out to meet growing storage demand.
IBM Global Technology Services September 2007 NAS systems scale out to meet Page 2 Contents 2 Introduction 2 Understanding the traditional NAS role 3 Gaining NAS benefits 4 NAS shortcomings in enterprise
More informationWHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup
WHITEPAPER 7 Reasons Why Businesses are Shifting to Cloud Backup Table of Contents Introduction..1 Internal Resource Efficiency..2 Enhance Security.2 Leverage Deduplication Technology..2 Process Validation
More informationEMC Backup and Recovery for Microsoft SQL Server
EMC Backup and Recovery for Microsoft SQL Server Enabled by Quest LiteSpeed Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication
More informationEMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER
EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER ESSENTIALS Mitigate project risk with the proven leader, many of largest EHR sites run on EMC storage Reduce overall storage costs with automated
More informationEMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
More informationReference Architecture. EMC Global Solutions. 42 South Street Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com
EMC Backup and Recovery for SAP with IBM DB2 on IBM AIX Enabled by EMC Symmetrix DMX-4, EMC CLARiiON CX3, EMC Replication Manager, IBM Tivoli Storage Manager, and EMC NetWorker Reference Architecture EMC
More informationEoin Thornton Senior Security Architect Zinopy Security Ltd.
RSA envision: Transform your Security Operations A Technical overview & demo of RSA envision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect
More informationIn the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a Business Edge
In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a Business Edge 7 Key Elements to Look for in a Multipetabyte-Scale Unified Storage System By Hitachi Data Systems April 2014
More informationEMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker
EMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker Reference Architecture EMC Global Solutions Operations
More informationData Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
More informationEMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise
EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with
More informationCompliance and Security Information Management for PCI DSS Requirement 10 and Beyond
RSA Solution Brief Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond Through Requirement 10, PCI DSS specifically requires that merchants, banks and payment processors
More informationProduct white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI
Product white paper ROI and SIEM How the RSA envision platform delivers an Industry-leading ROI This paper examines the Return on Investment (ROI) that a quality security information & event management
More informationStrategic archiving. Using information lifecycle management to archive data more efficiently and comply with new regulations
WHITE PAPER September 2005 Strategic archiving Using information lifecycle management to archive data more efficiently and comply with new regulations ABSTRACT Information lifecycle management can help
More informationSkadden, Arps, Slate, Meagher, and Flom
Customer Focus on Business Continuity, Backup, and Archiving Skadden, Arps, Slate, Meagher, and Flom Skadden contracts with EMC to safeguard global information infrastructure BUSINESS VALUE HIGHLIGHTS
More informationHP StorageWorks Data Protection Strategy brief
HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,
More informationCarestream Information Management Solutions. Managing the explosion in patient information
Managing the explosion in patient information Carestream Information Management Solutions Carestream Information Management Solutions The right information in the right place at the right time from the
More informationHow to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems
W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft
More informationEMC Virtual Infrastructure for Microsoft SQL Server
Microsoft SQL Server Enabled by EMC Celerra and Microsoft Hyper-V Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication is accurate
More informationHow To Use The Hitachi Content Archive Platform
O V E R V I E W Hitachi Content Archive Platform An Active Archive Solution Hitachi Data Systems Hitachi Content Archive Platform An Active Archive Solution As companies strive to better manage information
More informationSecuring Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
More informationEffective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure
Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Businesses benefit from streamlined data management both on premises and in the cloud. White Paper Published:
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationBringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper
Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices Business white paper Table of contents Data protection synonymous with business success...
More informationMaximize VMware with EMC
Maximize VMware with EMC Align your information infrastructure from storage and backup, to management, security, and disaster recovery to accelerate the value of VMware. Accelerate your VMware virtualization
More informationWHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY CONTENTS Storage and Security Demands Continue to Multiply.......................................3 Tape Keeps Pace......................................................................4
More informationIBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
More information16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept
16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept Applied Technology Abstract This white paper illustrates the ability to
More informationSales Tool. Summary DXi Sales Messages November 2009 6 NOVEMBER 2009. ST00431-v06
Summary DXi Sales Messages November 2009 6 NOVEMBER 2009 ST00431-v06 Notice This Sales Tool contains proprietary information protected by copyright. Information in this Sales Tool is subject to change
More informationRSA Executive Overview. Information Risk Management for the Financial Services Industry
RSA Executive Overview Information Risk Management for the Financial Services Industry An information-centric approach to security that empowers financial services institutions to meet the demanding needs
More informationEnergy Efficient Storage - Multi- Tier Strategies For Retaining Data
Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White
More informationNext Generation NAS: A market perspective on the recently introduced Snap Server 500 Series
Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series ABSTRACT In February 2006, Snap Server announced the 500 Series of Networked Attached Storage systems as well
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationTHE CASE FOR ACTIVE DATA ARCHIVING
THE CASE FOR ACTIVE DATA ARCHIVING Written by Ray Quattromini 3 rd September 2007 Contact details Tel: 01256 782030 / 08704 286 186 Fax: 08704 286 187 Email: sales@data-storage.co.uk Web: www.data-storage.co.uk
More informationThings You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationDISASTER RECOVERY ebook FACING DISASTERS HEAD ON
DISASTER RECOVERY ebook FACING DISASTERS HEAD ON CHAPTER 1: Facing Reality CHAPTER 2: Disaster Recovery Considerations CHAPTER 3: Making the Best Choices CHAPTER 4: A Single, Unified Solution CHAPTER 5:
More informationOptimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
More informationOPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
More informationCan CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?
SOLUTION BRIEF: CA INFORMATION GOVERNANCE Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? CA Information Governance delivers
More informationUsing EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments
Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Technology Concepts and Business Considerations Abstract EMC SourceOne Email Management enables customers to mitigate risk, reduce
More informationManaged Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
More informationEnterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
More informationWHITE PAPER. www.fusionstorm.com. Get Ready for Big Data:
WHitE PaPER: Easing the Way to the cloud: 1 WHITE PAPER Get Ready for Big Data: How Scale-Out NaS Delivers the Scalability, Performance, Resilience and manageability that Big Data Environments Demand 2
More informationILM: Tiered Services & The Need For Classification
ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationSolution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments
Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information
More informationD2D2T Backup Architectures and the Impact of Data De-duplication
D2D2T Backup Architectures and the Impact of Data De-duplication NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change
More informationEMC PowerPath Family
DATA SHEET EMC PowerPath Family PowerPath Multipathing PowerPath Migration Enabler PowerPath Encryption with RSA The enabler for EMC host-based solutions The Big Picture Intelligent high-performance path
More informationUsing HP StoreOnce Backup systems for Oracle database backups
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
More informationThe Hybrid Cloud Approach: CA ARCserve D2D On Demand
The Hybrid Cloud Approach: CA ARCserve D2D On Demand Small businesses benefit from a hybrid cloud solution for data backup and recovery White Paper Published: January 2012 Applies to: Microsoft Windows
More informationEMC Celerra NS Series/Integrated
Data Sheet EMC Celerra NS Series/Integrated High-end features in a mid-tier IP Storage solution: NS20, NS40, NS80 The Big Picture Ensure no-compromise availability through integrated advanced clustering,
More informationVirtual Provisioning. Management. Capacity oversubscription Physical allocation on the fly to logical size. With Thin Provisioning enabled
Management Virtual Provisioning Capacity oversubscription Physical allocation on the fly to logical size Automatic File System Extension past logical size With Thin Provisioning enabled Additional storage
More informationData Management using Hierarchical Storage Management (HSM) with 3-Tier Storage Architecture
P - 388 Data Management using Hierarchical Storage Management (HSM) with 3-Tier Storage Architecture Manoj Kumar Kujur, B G Chaurasia, Sompal Singh, D P Singh GEOPIC, ONGC, Dehradun, E-Mail kujur_mk@ongc.co.in
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationIntroduction to NetApp Infinite Volume
Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in
More informationQuantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
More informationEMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care
EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing
More informationHP ProLiant Storage Server family. Radically simple storage
HP ProLiant Storage Server family Radically simple storage The HP ProLiant Storage Server family delivers affordable, easy-to-use network attached storage (NAS) solutions that simplify storage management
More informationIP Storage in the Enterprise Now? Why? Daniel G. Webster Unified Storage Specialist Commercial Accounts
1 IP Storage in the Enterprise Now? Why? Daniel G. Webster Unified Storage Specialist Commercial Accounts 2 10Gigabit Ethernet in the News Every where you look 10Gb Ethernet products Changing the face
More informationAn Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 Brian McLean, CISSP Sr Technology Consultant, RSA Changing Threats and More Demanding Regulations External
More informationEMC Backup and Recovery for Microsoft SQL Server
EMC Backup and Recovery for Microsoft SQL Server Enabled by EMC NetWorker Module for Microsoft SQL Server Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the
More informationInterior Health Authority, British Columbia
Customer Profile Interior Health Authority, British Columbia EMC solutions support clinical and business applications for optimized patient care and cost-efficient IT operations Responsible for one of
More informationData Protection Report 2008 Best Practices in Data Backup & Recovery
Data Protection Report 2008 Best Practices in Data Backup & Recovery Prepared for: Executive Summary Data is growing at an incredible rate. As a result, the demands of data protection increase as well.
More informationSolutions White Paper. Using Storage Virtualization. to Meet the Challenges of Rapid Data Growth
Solutions White Paper Using Storage Virtualization to Meet the Challenges of Rapid Data Growth C GTSI Solutions / White Paper / Storage Economics GTSI s Data Management Solution Powered by Hitachi Data
More informationEMC Backup and Recovery for Microsoft Exchange 2007 SP2
EMC Backup and Recovery for Microsoft Exchange 2007 SP2 Enabled by EMC Celerra and Microsoft Windows 2008 Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the
More informationIBM Global Technology Services November 2009. Successfully implementing a private storage cloud to help reduce total cost of ownership
IBM Global Technology Services November 2009 Successfully implementing a private storage cloud to help reduce total cost of ownership Page 2 Contents 2 Executive summary 3 What is a storage cloud? 3 A
More informationAccelerating HIPAA Compliance with EMC Healthcare Solutions
Accelerating HIPAA Compliance with EMC Healthcare Solutions A HealthCIO White Paper Sponsored by the EMC Corporation by Jonathan Bogen 2003 E-mail: Info@HealthCIO.com www.healthcio.com Accelerating HIPAA
More informationWhite paper. Log Management Best Practices. The Foundation for Comprehensive Security Information and Event Management
White paper Log Management Best Practices The Foundation for Comprehensive Security Information and Event Management Executive Summary Log (event) management is the collection, analysis (real-time or historical),
More informationWHITE PAPER MOVING BEYOND BATCH BACKUP. Practical Steps to Improve Data Protection & Dramatically Reduce Backup Software Licensing Costs
WHITE PAPER MOVING BEYOND BATCH BACKUP Practical Steps to Improve Data Protection & Dramatically Reduce Backup Software Costs CONTENTS Backup s Busted... 3 Moving Beyond Batch Backup... 4 Further Savings
More information<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
More informationThe New Data Imperative
DISK-BASED DATA PROTECTION: The New Data Backup and Recovery Imperative DATA BACKUP HAS BEEN A CHALLENGE FOR DECADES: slow, costly, labor-intensive, and unreliable. The traditional medium of choice, tape,
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationHP and Mimosa Systems A system for email archiving, recovery, and storage optimization white paper
HP and Mimosa Systems A system for email archiving, recovery, and storage optimization white paper Mimosa NearPoint for Microsoft Exchange Server and HP StorageWorks 1510i Modular Smart Array Executive
More informationQUICK REFERENCE GUIDE: KEY FEATURES AND BENEFITS
QUICK REFERENCE GUIDE: FOR SMALL TO MEDIUM-SIZE BUSINESSES DISK-BASED BACKUP DXi4000 SERIES DEDUPLICATION APPLIANCES Patented data deduplication technology reduces disk requirements by 90% or more Scalable
More informationCost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.
Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationUsing HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
More informationATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V
ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER How Smart Data Tiering Makes Your Archive Modern
More informationEMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
More informationHow To Get A Storage And Data Protection Solution For Virtualization
Smart Storage and Modern Data Protection Built for Virtualization Dot Hill Storage Arrays and Veeam Backup & Replication Software offer the winning combination. Veeam and Dot Hill Solutions Introduction
More information