Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Access control

     authentication 2nd     defined     in ILM automation     in SANs 2nd 3rd Access control lists (ACLs)

Access time

     controller

     defined

Accidental data loss

ACLs (access control lists)

Acronyms 2nd

Actuator assemblies

Addressing

     in FC 2nd

     in SCSI

Age in information lifecycle 2nd

American National Standards Institute (ANSI) standard

Analyzers, FC

Angle brackets (<>) in XMLAppliances

     in remote copy 2nd

     SAN

Application independence in information

Application security 2nd Application-level backup and recovery 2nd 3rd 4th 5th 6thArbitrated loops

     defined     FC 2ndArchives     defined

     vs. backups 2ndArrays     backing up     benefits of 2nd     defined     RAID    RAID [See RAID (Redundant Array of Independent Disks)]

Association of Storage Networking Professionals (ASNP)

Asymmetrical encryption 2nd Asynchronous processes Asynchronous remote copy 2nd 3rd

ATA (AT Attachment) specification 2nd 3rd

Attacks

     denial of service

     man-in-the-middle     programmer error exploits 2nd

     viruses and Trojan horses 2nd Auditing in ILM automation 2nd

Authentication 2nd     defined     in iSCSI     in NFS     in SANs 2nd

     two-factor and multifactor

     user vs. host

Autoloaders 2nd

Automation

     CAS 2nd

         information movers

         policy engines for

         search and classification engines for

     DLM 2nd

     ILM 2nd

         auditing and tracking

     SAN encryption

Availability

     defined     for business continuity

     in DLM

     in protection costs

 < Day Day Up >   

Категории