The protection and storage of enterprise's massive data

Source: Internet
Author: User
Keywords Electronic data security tape
Tags .mall access according to the survey backup based business company computer

Problems
  
In the 20th century, the enterprise protection of important documents is mainly by the use of safes to save and send people to protect. In the 2l century, enterprises began to fully implement automated office, computer networks become information processing and storage tools. However, because of the sharing and diffusion of the computer, the information can be easily leaked and stolen in the process of processing, storing and transmitting. According to the survey, up to the first half of 2007, rising company to accept the help of the injured user has reached more than 100,000 people. Then the information security technology to follow up, the enterprise's information safety risks more attention, managers are no longer simply satisfied with the firewall and other primary defense means, enterprise data protection and storage security solutions are urgently needed. The problems that are currently occurring are:

(1) Mobile disk leaks, the main cause of this phenomenon is to store the data on the unsecured mobile disk, and did not effectively encrypt the data.
  
(2) Word document leaks, mainly some cracked software opportunity to start, so that data loss.
  
(3) Printer leaks, now most companies use shredders can be useless or missing documents into powder, so that it can not be restored, but the virtual smash we turn a blind eye.
  
(4) The message leaks, it is through a network virus to forge the recipient's address, thereby deceiving the reader. Companies with publicly reported data loss are expected to cause customers and revenues to fall by 8%, according to the latest itpolicycompliancegro-up report, with a 8% per cent drop for listed companies.
  
Enterprise Data Protection measures

2.1 Data Backup

for an enterprise, the provision of reliable data protection is critical and an important trump card for the core competencies of the enterprise. One of the most effective means of protecting data is data backup. And the data backup based on tape system is an important means of enterprise data protection. The system can not only guarantee the security of large-capacity data, but also can complete the recovery of data in a short time and ensure the normal operation of all kinds of business systems in the data, which is the inevitable choice of data security. Authoritative statistics show that 93% of companies will go bankrupt within a year of a disaster due to a 10-day or more data center disaster. To this end, SMEs need to adapt their own data protection solutions to ensure the continuity of business operations.

2.2 Enterprise Confidential electronic data protection

Enterprise confidential electronic data and enterprise development are closely related, to strengthen the security of these electronic data access protection is the most concerned about the current enterprise. According to the actual security needs of enterprises, using the idea of non active encryption, through perfect network security management structure, Key Management Server and secure access mechanism of electronic data, an enterprise electronic data security monitoring system is established to meet the needs of enterprise security. The system realizes the transparent access to the key through the key server, as well as the transparent encryption and decryption processing of the confidential electronic data of the enterprise, which ensures the security of the enterprise confidential electronic data. such as CDP (contimuousdatapro-tection, continuous data protection) programs. Recently, SafeNet and Aladdin formally merged, the company will protect the world's largest electronic banking transactions, providing the largest number of digital identity certification products, providing the most software protection products, will further promote the development of confidential electronic data protection. Symantec Company also launched the market-leading enterprise data protection solution VeritasNetBackup6.5. With the NetBackup platform, organizations have the best performance of unprecedented flexibility and choice, helping businesses choose Best-of-breed technologies in replication, snapshots, continuous data protection, data de-duplication, encryption, virtual tape, and traditional tape. The

Enterprise Data Storage Security Method

Storage is a service, which is a relatively new concept. From the data center to the desktop and the entire technical memory line, the key is to solve the security problems around the information. In the past, storage was viewed as a "subsystem" for server access control and file system privilege protection, and now storage has become an intelligent, multi-protocol Network service based on high-speed fibre Channel, optical transmission, etc. The analysis of secure access technology is based on the main safety technology of electronic computer, and puts forward corresponding solutions for different problems, such as secure access and protection of enterprise electronic data. At present, the enterprise electronic data security access solution, the main logical encryption disk technology, file System Monitor, electronic textA safe. The basic idea of the logic encryption disk technology is to increase the kernel service of the device management on the operating system, and provide the virtual disk for the user to save the electronic document. File System Monitor is primarily a monitoring application that is active on all file systems. Electronic file safe is the main guarantee of electronic documents storage security, equivalent to the electronic documents stored in a "safe". But these efforts are not enough, for an enterprise's survival, confidential electronic data access is absolutely important.

3.1 Virtual Tape library

for small businesses, the choice of storage products should be considered from two points, starting with the actual amount of data generated by the business, followed by the growth of business data. Currently the more popular storage system solutions are disk arrays, virtual tape libraries, and tape libraries. With disk backup based on virtual tape libraries, SMEs can implement faster processes and find and retrieve data with little error, reduce reliance on past tape backups, and achieve a more reliable backup process that makes data protection simpler with significant cost savings. such as the appearance of AIOD2D automatic loader. AIO is an integrated networked storage system for small and medium-sized Enterprises launched by Hewlett-Packard Corporation. With AIO, small and medium-sized enterprises can be backed up without interruption of application to achieve reliable data protection. Now, with hpstorageworksvlsl000i and mini virtual tape library products, midsize enterprises and remote companies, branch offices can use a new solution.

3.2 Enterprise Electronic data Security monitoring system

Enterprise electronic Data Security monitoring system is originated from a passive encryption thought route design, that is, the system automatically generated key: The system transparently obtain encryption and decryption of electronic Data key: and by the system real-time control plus decryption process. The system can provide security support mainly includes the following aspects:

(1) Close cooperation and division of labor between the Internet and Internet of the enterprise itself.

(2) Data backup service management, mainly through identity authentication and authorization to ensure the security of the system.

(3) Key Management Server is the key component of data security assurance, which is mainly responsible for generating, updating and managing the encryption key that is decrypted when data is accessed.

(4) confidential data processing and maintenance.

(5) Mail Service, Web services monitoring and filtering.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.