
|
Overcoming Challenges to Storage Security |
 |
Data Security: Why Common Criteria Matters |
For the past several years – and for the foreseeable future – data security has been a very hot topic in enterprise computing. A combination of evolving security threats
|
Unlike other computer security standards, the Common Criteria for Information Technology Security Evaluation is not a set of specific security requirements or features.
|
Read More... |
Find Out More... |
 |
| Meet Hitachi Data Systems Executives and Learn About the Future of Data Storage at Inspire Life - London |
How Secure Multitenancy Manages Resources Efficiently – While Protecting Data |
Combine enterprise-sized needs with the budget constraints of a growing business and you have the dilemma of the mid-sized organization.
|
Simple Modular Storage is a simple and reliable solution for small and medium businesses (SMBs) that offers enterprise-class storage features and data protection solutions. |
Read the News... |
Learn More... |
|
 |
Overcoming Challenges to Storage Security
 For the past several years – and for the foreseeable future – data security has been a very hot topic in enterprise computing. A combination of evolving security threats, more stringent compliance initiatives and increased reliance on network based storage have collectively raised the stakes, making it more necessary (and more difficult) than ever for enterprises to protect their stored data. |
 |
| Consider, for example, the average health care provider. It must comply with an array of data-related regulations not only as a matter of customer service but as a matter of law. Patient records must be protected according to U.S. HIPAA regulations. Any healthcare provider that accepts credit cards must also comply with the Payment Card Industry Data Security Standard (PCI DSS). And many medical institutions comply, either voluntarily or by mandate, with the Sarbanes-Oxley Act, which puts CEO and CFO jobs on the line for accurate financial reporting. With all these regulations in play, an organization must take into account not only the preservation of data but also its protection against fraud, tampering and loss. |
 |
| Unfortunately, many vendors’ approaches to storage still focus on availability at the expense of security. They are simply more familiar with availability-related challenges such as data aggregation, storage consolidation, and remote replication than with security-related issues such as access control, integrity and confidentiality. This disconnect between storage providers’ areas of greatest expertise and storage customers’ areas of greatest need can result in grave threats to enterprise security. |
 |
| Hitachi Data Systems takes a different approach, considering security, storage and networking as an interconnected whole. The result is storage solutions that enable regulatory compliance, feature-rich data protection, and advanced data security capabilities. |
 |
| In the future, there will be more data rather than less; and as there’s more data to store and classify, problems of availability, control and security will only become more complex. As enterprises tackle these difficult questions, one thing is clear: it’s vital to incorporate security into the storage infrastructure now, so that you can be better prepared to weather challenges – and take advantages of opportunities – in the future. |
 |
| If you’re concerned about the security of your storage, Hitachi Data Systems consultants can help. In a Risk Analysis Workshop, consultants can identify, rank, and evaluate risks specific to your business operations and recommend a road map for remediation. Contact your Hitachi Data Systems representative for more information. |
 |
Data Security: Why Common Criteria Matters

Unlike other computer security standards, the Common Criteria for Information Technology Security Evaluation is not a set of specific security requirements or features. Instead, it lays out a framework for a process by which users may specify requirements, vendors may implement security features and labs may test them. In other words, it’s less about specifications and more about ensuring that products are developed and tested in a rigorous manner. |
| The Common Criteria certification unified existing European, Canadian and American security standards so that vendors selling into those markets could be evaluated against a single, clearly established set of policies. Now security-conscious buyers can have more confidence in their IT products knowing that they have been independently assessed and Common Criteria certified.For more on Common Criteria, contact your Hitachi Data Systems representative to find out how Hitachi Data Systems products support the Common Criteria or visit Common Criteria Portal. |
 |
Meet Hitachi Data Systems Executives and Learn About the Future of Data Storage at Inspire Life - London
 Inspire Life – London brings together the Hitachi, Ltd. family of businesses under one roof to offer insight into the future of Hitachi technology. As part of this exhibition, Hitachi Data Systems will be presenting a pan EMEA partner and customer event called Inspire Storage.
At Inspire Storage, you can learn about: |
| |
 |
Hitachi Data Systems’ business direction and channel strategy for 2008 |
 |
| |
 |
How Hitachi Data Systems technology platforms are enabling businesses to benefit from storage virtualization, data protection, green IT and high performance IT infrastructure solutions and services |
| |
 |
|
 |
| You can also meet Hitachi Data Systems executives and Inspire Storage partners in seminars and in the Inspire Storage exhibition zone. |
 |
| Inspire Life – London takes place February 20 and 21, 2008, at the QEII Conference Centre in London. Customer Day is February 20; Partner Day is February 21. |
Find out more |
 |
How Secure Multitenancy Manages Resources Efficiently – While Protecting Data

Secure multitenancy reduces network infrastructure costs by centralizing and efficiently managing disparate types of storage with uniform policies and procedures. Storage systems offering secure multitenancy allow each virtual host connection to be assigned its own private storage address space. This ensures that no other host connection can see, modify, or destroy data allocated to this host connection. Secure multitenancy means that multiple hosts can share the same physical resources, safe and secure in their own address space. No other storage vendor besides Hitachi Data Systems provides this level of port connectivity and protection. |
|
| |
 |
 |
Comment on this story |
|
| Get the Facts |
In the Blogs: |
| The Lowest Common Denominator |
| Hu Yoshida, CTO of Hitachi Data Systems More... |
| Chewing Metadata… |
| Vincent Franceschini, Senior Director of Future Technologies for Hitachi Data Systems More... |
 |
Analyst Report: |
| Hitachi Data Systems: A Storage Security Leader, by Enterprise Strategy Group More... |
 |
White Paper: |
| Introduction to Storage Security (by SNIA) More... |
| Securing a Shared Storage Infrastructure with Technology from Hitachi Data Systems and Cisco Systems More... |
| Fibre Channel Security Protocols and Hitachi Storage More... |
| . |
| Events |
7th Storage Forum, December 3 - 6, 2007, Hotel Hafen Hamburg, Hamburg, Germany More... |
 |
SNIA 2008 Winter Symposium, January 28 - February 1, 2008, Wyndham San Jose, San Jose, California |
| An opportunity for all Storage Networking Industry Association members (and invited guests) to participate in various Committee, Forum, Technical Work Group, and Birds of a Feather Sessions. More... |
 |
SSIF Storage Security Summit, January 30 - February 1, 2008, Sun Microsystems Santa Clara Campus Auditorium, Santa Clara |
| CA
Interact with storage and security professionals and the audit and academic communities at a must attend event - the sixth Storage Security Summit sponsored by the SNIA's Storage Security Industry Forum (SSIF).
More... |
 |
Inspire Life – London, February 20-21, 2008, QEII Conference Centre, London |
| A major technology exhibition bringing the entire group of Hitachi businesses under one roof.
More... |
 |
SHARE, February 24-29, 2008, Disney’s Coronado Springs Resort, Orlando, FL |
| SHARE provides the most up-to-date information on major issues taking place in enterprise technology. There are numerous sessions that cover virtualization and provide sound advice for the proactive, informed IT professional.
More... |
|