FAQ

What stage of the data storage security project are you in?

Q: Where are you at in the lifecycle of project planning?

Understanding the motivation behind a data storage security project is critical in validating if and when a project will occur. When the need is established and is driven by an upper management directive, or is a component of a compliance program, there is a high probability that the project will occur with the usual course of events:

  1. Information collection
  2. Evaluation of the proposed concept
  3. Technology evaluation
  4. Procurement
  5. Deployment

About the expert
Ryk Edelstein is the founder and director of operations of Converge Net Inc., a Montreal-based network services provider specializing in data loss prevention, risk and vulnerability management, and automated policy violation detection and protection. He has held various roles for a number of IT services companies since 1981. Click to download his data storage security FAQ podcast.

At the early stages of a data storage security project, when the client is assessing best practices, budget, buy-in and motivation may not be established, and the procurement cycle will be protracted.


This was first published in March 2008

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: