Home | Articles | About | Contact | Forum |
Saturday, November 02, 2024



Lunarpages.com Web Hosting

Mailing List

E-mail:
By Joining the mailing list you will be notified of site updates.


Show Your Support For
This Site By Donating:











Audience: IT administrators
Last Updated: 8/28/2012 11:09:18 PM
**All times are EST**





Data Security vs. Data Protection

By Erik Rodriguez

Tags: data encryption, data backup, SAN replay, data archiving, data de-duplication

This article provides information on the difference between data security and data protection.



What is data security?

Securing data is often the first priority of any organziation and because of this, are many options available to acheive data security. These options are often firewalls, ACLs (access control lists), and variable-based security of some type. Depending on the importance of the data, companies may relay on any number of these methods.

What is data protection?

Data protection is the level of availability or confidence in being able to access such data. Like data security, there are many options to ensure data protection. These options often come in the form of RAID, data replication, and data archiving. Depending the data itself, companies may replay on any number of these methods. Data that is changed frequently may be stored at certain intervals using SAN replays, replication, a form of incremental backups.

Old data is often stored as archive data so that it may be referred to if and when it is ever needed. It's heavily compressed using a data de-duplication algorithm. It may be stored on any available storage medium include tape drives. Some archive data deemed for "deep security" is usually encrypted via software or, in poor cases encryption hardware device.

Some storage arrays have the ability to do some or all of the features mentioned. Virtualization software like VMware and Hyper-V have taken the needs of data protection and data security and developed tools to achieve both. As technology progresses, and more data shifts to the cloud we will see more emphasis on both data protection and data security.



Contact Us

If you found this information useful, click the +1 button



Your E-mail:


Subject:


Type verification image:
verification image, type it in the box

Message:


NOTE: this form DOES NOT e-mail this article, it sends feedback to the author.


TCP vs. UDP
Juniper SRX anti-spam filtering config
Windows Server 2008 Clustering Configuration
Windows 2008 R2 Network Load Balancing (NLB)
Extreme Networks: Downloading new software image
Juniper SRX save config to USB drive
Juniper SRX logout sessions
Extreme Networks Syslog Configuration
Command line drive mapping
Neoscale vs. Decru
Data Security vs. Data Protection
Juniper SRX Cluster Configuration
HOWTO - Create VLAN on Extreme Switch
Using a Non-local Colocation Facility
Linux Server Administration
IT Chop Shops
Flow Viewers: SFLOW, NetFLOW, and JFLOW
Exchange 2007 Back Pressure
IPtables open port for specific IP
Politics in IT Departments
HOWTO - Block Dropbox
Cisco IOS Cheat Sheet
Subnet Cheat Sheet
Design a DMZ Network
How DNS works
Firewall Configuration
Juniper SSG Firewalls
Server Management
Configuring VLANs
Runlevels in Linux
Server Clustering
SONET Networks
The Red Hat Network
Server Colocation
Complicated Linux Servers
Dark Fiber
Data Center Network Design
Firewall Types
Colocation Bandwidth






Copyright © 2002-2016 Skullbox.Net All Rights Reserved.
A division of Orlando Tech Works, LLC
By using this site you agree to its Terms and Conditions.
Contact Erik Rodriguez