{"id":5454,"date":"2016-04-18T14:27:12","date_gmt":"2016-04-18T14:27:12","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5454"},"modified":"2019-11-15T13:52:39","modified_gmt":"2019-11-15T11:52:39","slug":"how-secure-is-your-storage","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/how-secure-is-your-storage\/5454\/","title":{"rendered":"How secure is your storage, does this keep you up at night?"},"content":{"rendered":"<p>We all know that data is core, critical, sensitive, and valuable to any and all business as well as everyone personally. We also know that data continues to grow exponentially and is varied in type. Now add the fast adoption rate of mobile phones, tablets, and gaming consoles, along with traditional computers and PCs, and there is now an ever increasing rate of \u00a0data breeches and vulnerability. Users also want and expect access to data 24\/7, with no barriers or lag times.<\/p>\n<p>These environments may house any amount of sensitive data assets such as personnel information, including social security numbers and human resource related records, customer payment and account information, a patient\u2019s medical records, and a company\u2019s intellectual property information. This sensitive information can be structured (held within a database) or it can be unstructured (residing in Word documents, PDFs, image files, spreadsheets, etc.). That is why this data can be a prime target and the threat of viruses and other lethal malware remains a constant concern for many IT organizations.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>How secure is your #storage, does this keep you up at night?<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F36GE&amp;text=How+secure+is+your+%23storage%2C+does+this+keep+you+up+at+night%3F\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It is unsettling how these threats can spread throughout an organization at terrifying speeds capitalizing on the interoperability of modern networks. In a constantly growing threat landscape, it only takes a single infected file unknowingly placed into the storage environment to expose every node on the network to immediate risk.<\/p>\n<p>In implementing a cost effective, efficient infrastructure and datacenter, companies implement an environment where users have shared access to systems and storage. This adds an additional challenge for IT, as most organizations will have multiple departments or groups accessing the shared storage.\u00a0 These departments may have different policies, risks, and usage requirements. The users have varying access authorization, are geographically dispersed, and are on varying networks. As such, they are vulnerable to external attacks, malicious insiders, compromised systems, and lax policies.<\/p>\n<p>As business continue to roll out data storages across their IT estate, their corporate infrastructure and data centers have a wide range of heterogeneous hardware of servers and storage. That is why it is critical to ensure that the data is secure and that both the storage infrastructure and the security solution it depends upon are reliable and efficient.<\/p>\n<p>By implementing a security solution designed specifically to protect storage devices and knowing that the security solution and the storage platform have been tested, certified, and proven to work well together, companies can protect their customers and themselves from threats.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>NAS\u00a0without anti-malware #protection are a direct threat to the security of the corporate IT infrastructure #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F36GE&amp;text=NAS%C2%A0without+anti-malware+%23protection+are+a+direct+threat+to+the+security+of+the+corporate+IT+infrastructure+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Dell and Kaspersky Lab are addressing this threat by <a href=\"http:\/\/en.community.dell.com\/dell-blogs\/dell4enterprise\/b\/dell4enterprise\/archive\/2016\/02\/25\/dell-accelerates-fluid-file-system-momentum\" target=\"_blank\" rel=\"noopener nofollow\">certifying that the Dell\u2122 Fluid File System (FluidFS) on the FS8600 platform and Kaspersky Security for Storage work efficiently and effectively together.\u00a0<\/a> Kaspersky Security for Storage provides high-performance, scalable protection for valuable and sensitive corporate data. \u00a0Dell FluidFS storage offerings are open-standards-based, scale-out network-attached storage (NAS) solutions that meet the capacity, performance, reliability, flexibility and scalability requirements of modern data centers. Since the FluidFS on FS8600 provides integrated antivirus functionality that allows administrators to manage behavior from the Enterprise Manager interface such as file or directory paths to exclude from scanning or even exclude files by size, this can also be done from the Kaspersky Security for Storage console.<\/p>\n<p>Network data storage architectures without anti-malware protection are a direct threat to the security of the corporate IT infrastructure, customer\u2019s data and a company\u2019s reputation. By implementing Kaspersky Security for Storage with Dell FluidFS storage platform as a complete solution, it will help network administrators to secure the corporate network against harmful malware and malicious virus code from spreading via the NAS.<\/p>\n<p>For more details please refer to <a href=\"http:\/\/en.community.dell.com\/techcenter\/extras\/m\/white_papers\/20442191\" target=\"_blank\" rel=\"noopener nofollow\">Dell Fluid File System v5 and Kaspersky Lab Solution brief<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Users also want and expect access to data 24\/7, with no barriers or lag times.<\/p>\n","protected":false},"author":480,"featured_media":15342,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[2082,2409,352,2272],"class_list":{"0":"post-5454","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-enterprisesec","10":"tag-dell","11":"tag-kaspersky-lab","12":"tag-nas"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-secure-is-your-storage\/5454\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-secure-is-your-storage\/3728\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-secure-is-your-storage\/5454\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-secure-is-your-storage\/5454\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/enterprisesec\/","name":"#EnterpriseSec"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/5454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=5454"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/5454\/revisions"}],"predecessor-version":[{"id":24408,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/5454\/revisions\/24408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15342"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=5454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=5454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=5454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}