White Papers

  1. Disk-Based Backup And Restore Reaching The Next Level
    10/21/2009
    This paper outlines conventional disk-based backup and restore methods and the paradigm shift needed to keep up with escalating data growth, shrinking backup windows, overburdened IT Administrators, and overtaxed IT budgets. By Strategic Storage Solutions
  2. White Paper: Fibre Channel Security
    6/24/2009
    By itself, Fibre Channel is not a secure protocol. Without implementing certain security measures within a Fibre Channel SAN, application servers will be able to see all devices on the SAN and could even write to the same physical disk! The two most common methods of providing security on a Fibre Channel SAN are zoning and LUN masking. By Falconstor
  3. Fibre Channel Security
    6/24/2009
    By itself, Fibre Channel is not a secure protocol. Without implementing certain security measures within a Fibre Channel SAN, application servers will be able to see all devices on the SAN and could even write to the same physical disk! The two most common methods of providing security on a Fibre Channel SAN are zoning and LUN masking. By Falconstor
  4. Take The VoWLAN Challenge
    7/21/2008
    Encryption and authentication are the two main components of VoWLAN security. Many handsets support only the WEP (wired equivalency privacy) security standard, which has proven to be insufficient protection against intruders. By Business Solutions Magazine
  5. Take The VoWLAN Challenge
    7/21/2008
    Encryption and authentication are the two main components of VoWLAN security. Many handsets support only the WEP (wired equivalency privacy) security standard, which has proven to be insufficient protection against intruders. By Business Solutions Magazine
  6. Regional Florida University Data Center Gives High Marks To SANRAD V-Switch
    2/21/2008
    Northwest Regional Data Center (NWRDC) need to construct a cost-effective disaster recovery solution that automatically and efficiently secures data in an off-site location to protect against system, power, or network failures. The proposal was a customized solution that leveraged unique intelligent network switch technology from SANRAD. Submitted by SANRAD
  7. Article: Are You Doing All You Can To Build Network Security Revenue?
    2/4/2008
    White Paper: Are You Doing All You Can To Build Network Security Revenue?
  8. Are You Doing All You Can To Build Network Security Revenue?
    2/4/2008
    In this article three vendor experts respond to questions recently posed to the readers of Business Solutions magazine — questions designed to challenge VARs. However, along with those questions, the experts offer advice for VARs, integrators, consultants, and others looking to capitalize on the growing network security market in 2008. Used with permission from Business Solutions magazine
  9. Server Virtualization: The Tip Of The Iceberg By Kim Tchang, SANRAD
    12/14/2007
    White Paper: Server Virtualization The Tip Of The Iceberg By Kim Tchang, SANRAD
  10. Server Virtualization: The Tip Of The Iceberg By Kim Tchang, SANRAD
    12/14/2007
    Like iPOD for the consumer market, server virtualization is one of the hottest technology trends to sweep the commercial market. Many enterprises are deploying or investigating server virtualization to save power, cooling and management costs, improve asset utilization, and increase flexibility. Submitted by SANRAD