Download now Free registration required
As enterprises continuously strive to consolidate resources and infrastructure, storage administrators find themselves under increasing pressure to scale up and reuse centralized storage systems, instead of deploying individual systems for each application. This trend worries security teams, justifiably: when multiple applications depend on the same storage system, the cost of a security flaw in that system is amplified. It is an unacceptable violation of due care for a company to leave protected information vulnerable to storage system flaws exposed to untrusted networks and applications. As any experienced security professional knows, it is always possible - even likely - that new vulnerabilities will be discovered in the future.
- Format: PDF
- Size: 196.11 KB