Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Sales, risk to 2nd

SANs [See Storage Area Networks (SANs)] Sarbanes-Oxley (SOX) Act 2ndSAS (Serial Attached SCSI)     benefits of     defined

     working with 2nd

SATA (Serial ATA)

     characteristics 2nd

     defined

     in DLM

     SAS support for 2nd

Scaling in san

Scanned documents, ILM for

Schema

     defined

     ILM 2nd 3rd

     XML 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

Scope in information protection costs

SCSI (Small Computer Systems Interface) 2nd 3rd     addressing in

     controllers in 2nd

     defined

     in file system bypassing 2nd

     in IP-based SAN attacks     inline management of 2nd     iSCSI

     LUNs in         locking         masking 2nd 3rd     parallel 2nd 3rd 4th

     protocols     SAS 2nd     standards     targets and initiators in 2nd SCSI Enclosure Services (SES) 2nd SCSI Trade AssociationSearch engines

     for ILM automation

     vs. inference engines 2nd SearchStorage.Com site Secrets, theft of 2nd

Securities and Exchange Commission 2nd

Security concepts 2nd

     defense in depth 2nd 3rd 4th

     diversity of defense 2nd     encryption 2nd

     key points     least privilege 2nd 3rd

     typical attacks 2nd 3rd Security postures 2nd 3rd Security through obscurity Selective backup and restore 2nd Serial ATA (SATA)

     characteristics 2nd

     defined

     in DLM

     SAS support for 2nd

Serial Attached SCSI (SAS)

     benefits of

     defined

     working with 2nd

Server Message Block (SMB) protocol

Server type programming errors 2nd

Server-less backups 2nd

Servers in LAN-based backups

SES (SCSI Enclosure Services) 2nd

SHA-1 hashes Shadow copies

Shadowing in RAID

Shareholder lawsuits

Simple Name Server (SNS)

Single-mode fiber optic cable Single-tape backups Slashes (/) in XML

Slave devices in parallel ATASmall Computer Systems Interface [See SCSI (Small Computer Systems Interface)] Smart cards SMB (Server Message Block) protocol

Snapshots     defined     replication     vs. backups SNIA (Storage Networking Industry Association) SNS (Simple Name Server) SNUG (Storage Networking User Groups)

Soft zoning in FC 2nd

Software     failures in 2nd 3rd     for backups and restore 2nd 3rd

     with vendor lock-in 2nd

Solid-state storage

     defined

     uses SOX (Sarbanes-Oxley) Act 2nd

Specificity in policiesSpeed

     of backups     of restoring dataSpoofing     defined     IP-based SAN hosts

     WWN 2nd

SQL replication commands

SRDF (Symmetrix Remote Data Facility)

Standard lifecycles

State

     defined

     in context

Stateful failover

Storage and storage technology 2nd

     access time

     arrays, libraries, and jukeboxes 2nd

    DAS [See Direct Attach Storage (DAS)]

     data access in

     for backup and recovery 2nd 3rd     history of 2nd 3rd 4th

     I/O 2nd

     I/O stack 2nd 3rd 4th 5th 6th

     key points 2nd

     model for 2nd     NAS 2nd 3rd 4th 5th     roles of 2nd

    SAN [See Storage Area Networks (SANs)]    security for [See Storage system security]     streaming tape 2nd     vs. ILM

Storage Area Networks (SANs) 2nd 3rd 4th     backups 2nd 3rd 4th 5th 6th     components of 2nd     defined     FC 2nd 3rd 4th 5th 6th     hybrid NAS-SAN devices 2nd     IP-based 2nd 3rd

     iSCSI

     over MANs and WANs 2nd     remote copy for     risk multiplier of

     security in

         access control and encryption 2nd 3rd

         authentication 2nd

         FC vulnerabilities 2nd 3rd 4th 5th 6th 7th 8th 9th         IP-based vulnerabilities 2nd 3rd 4th 5th

         NAS security         SCSI vulnerabilities 2nd 3rd

         switch operating systems     system management software for 2nd Storage Networking Industry Association (SNIA) Storage Networking User Groups (SNUG) Storage Networking World

Storage switches

     defined

     intelligent

Storage system security 2nd 3rd

     case study

     checklist for 2nd

     DAS 2nd

     internal and external vectors in 2nd 3rd

     key points 2nd

     practices for 2nd 3rd 4th 5th 6th

     risk in 2nd 3rd 4th

     role of 2nd 3rd

    SAN security [See Storage Area Networks (SANs)]

     secure FC channel protocolsStreaming transfer

     defined

     tape 2nd

Striping in RAID

Structured data     backup constraints 2nd     classifying

     in ILM 2nd Sufficient action for data protection Switched fabric 2ndSwitches

     FC 2nd 3rd 4th     intelligent     SANs Symmetrical encryption Symmetrix Remote Data Facility (SRDF) Synchronous processes Synchronous remote copy 2nd 3rd

System failure, data loss from 2nd

System management software for SANs 2nd

 < Day Day Up >   

Категории