United States
Site Map Contacts Hitachi Global Community
Data Storage Blogs - Hitachi Data Systems Hitachi - Inspire the Next

Data Center Advisors - IT and Storage Advice from HDS

Home > Corporate > HDS Blogs > IT Security

IT Security

Hitachi LPARs Provide Safe Multi-Tenant Cloud With Intel E5v3

Hitachi’s Intel Xeon based Compute Blade servers (CB 2000 and CB 500) feature an embedded logical partitioning (LPAR) capability implemented in the blade server firmware, based on technology originally developed for Hitachi mainframe and Unix systems to provide platform partitioning [...]

Continue reading "Hitachi LPARs Provide Safe Multi-Tenant Cloud With Intel E5v3" »

HCP Puts IT in Control of Content Mobility

Mobility is a macro trend that is transformative. Mobile devices, mobile workforces, mobility of data on premise, off premise, and across the globe, create many new business opportunities. However mobility also presents new challenges for the IT professionals who are [...]

Continue reading "HCP Puts IT in Control of Content Mobility" »

Storage Data Protection Efficiencies

Data Protection has two roles. One is the protection of data, and the other is to protect the application that uses that data. Data must be protected from loss, corruption, denial of access, and unauthorized access. Protection from loss is [...]

Continue reading "Storage Data Protection Efficiencies" »

When is losing data not important?

As a long time storage person the notion of “thou shalt not lose data!” was ingrained in me. In my last trip to Chicago, I came across an example of where this is not true. It is in the mach speed [...]

Continue reading "When is losing data not important?" »

Business Resilience Is a Constant Concern

Ros Schulman is our leading expert on disaster recovery and business continuance. Many of you may have heard her speak at different events or had her visit your business to provide an update on our DR capabilities.  I asked her [...]

Continue reading "Business Resilience Is a Constant Concern" »

Encryption of Data at Rest

Late last night I got an email from  Christopher Kusek asking about FICON Encryption of data at rest. “Hey Hu, I was reading a post from 2008 whereby it was stated that there was a solution for data at rest [...]

Continue reading "Encryption of Data at Rest " »

Cutting Off the Cloud in South Silicon Valley

Yesterday I left the Rosen Shingle Creek hotel in Orlando where I had been attending SNW at 6:30 am to catch my flight back to San Jose via Dallas. I called my wife to let her know what time to expect me [...]

Continue reading "Cutting Off the Cloud in South Silicon Valley" »

Virtualization is about lying

Eric Hibbard, the plain speaking Chair of the SNIA Security Technical Work Group, often says that Virtualization is about lying and security is about understanding the truth. I prefer to say that virtualization simplifies management and improves efficiency by masking [...]

Continue reading "Virtualization is about lying" »

Authentication - How do I know you are who you say you are?

Let’s say you are in a strange city, Like San Diego, and some one knocks on your hotel room door. Instead of throwing the door wide open, in this day and age, we issue a challenge. “who’s there?” If the [...]

Continue reading "Authentication - How do I know you are who you say you are?" »

To Encrypt or not encrypt

Lucas Mearien of Computer World reported that ABN Amro Mortgage Group Inc, will no longer send data tapes to its credit reporting bureaus after one of its tapes went missing. The company’s CEO Thomas Goldstien is quoted as saying “the [...]

Continue reading "To Encrypt or not encrypt" »

More Comfortable, encrypted and lost?

After my last post about the loss of backup tapes containing personal information, including my own, at Marriott Vacation Club International, Anil Gupta asked me if I would feel more comfortable if the data was encrypted and lost. (He had [...]

Continue reading "More Comfortable, encrypted and lost?" »

Waiting for my Marriott Letter

I have been a very happy owner of a share of Marriott’s Newport Coast Villas. Whether I continue to be happy will depend on a letter of notification that Marriott Vacation Club International may send me in the next few [...]

Continue reading "Waiting for my Marriott Letter" »

Personal Data Privacy and Security Act

Senators Arlen Specter and Patrick Leahy Introduced the Personal Data Privacy And Security Act Of 2005. “Our laws need to keep pace with technology,” said Leahy. “Insecure databases have become low-hanging fruit for hackers looking to steal identities and commit [...]

Continue reading "Personal Data Privacy and Security Act" »

page top