The Storage Networking World conference in Orlando last week was bustling with scores of vendors and buyers talking about everything from storage security to storage resource management.In fact, SRM – the ability to centrally manage and provision multivendor, multitechnology storage resources – seems to have eclipsed virtualization as the Holy Grail of storage. But vendors define SRM differently, so it will be some time before we can agree on an end point and start to map out how to get there.I was at the show – sponsored by sister publication Computerworld in conjunction with the Storage Networking Industry Association (SNIA) – to chair a vendor panel on storage security. As storage resources are networked and we adopt technologies such as iSCSI to move storage data around IP networks, sometimes over distance, it becomes clear we need to start adopting traditional network security thinking.I asked the panel – which included representatives from Decru, Iron Mountain, Kasten Chase, Nortel and Vormetric – if storage is a feature or a product. Bill Schroeder, president and CEO of Vormetric, argued that storage security is complex so it is best addressed in stand-alone products offered by companies like his that are focused on the task. Maybe with time it gets absorbed into other products, he said.While you would expect him to say that, Dan Avida, president and CEO of Decru, pointed out that everyone thought Check Point Software wouldn’t get off the ground because of Cisco, but look at it today. “The need for high performance dictates use of stand-alone products,” he said. Asked whether it was more important to secure primary or secondary storage – given secondary is often transported and sometimes ends up off site – Avida argued for primary. “If you encrypt that, everything you back up will already be secured.”But some of the panelists said you don’t need to secure everything. Focus on the applications that are the most sensitive.There was some disagreement about key management. Schroeder said it isn’t much of an issue because the systems use the same key in the encryption process as they do in decryption. But Avida says that key rotation was important. You want to make sure your key management system can unlock data that has been locked away for years.If nothing else, the panel highlighted that storage security is an emerging and important field that deserves study. Related content news analysis Western Digital keeps HDDs relevant with major capacity boost Western Digital and rival Seagate are finding new ways to pack data onto disk platters, keeping them relevant in the age of solid-state drives (SSD). By Andy Patrizio Dec 06, 2023 4 mins Enterprise Storage Data Center news analysis Global network outage report and internet health check Cisco subsidiary ThousandEyes, which tracks internet and cloud traffic, provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz and Tim Greene Dec 06, 2023 286 mins Networking news analysis Cisco uncorks AI-based security assistant to streamline enterprise protection With Cisco AI Assistant for Security, enterprises can use natural language to discover policies and get rule recommendations, identify misconfigured policies, and simplify complex workflows. By Michael Cooney Dec 06, 2023 3 mins Firewalls Generative AI Network Security news Nvidia’s new chips for China to be compliant with US curbs: Jensen Huang Nvidia’s AI-focused H20 GPUs bypass US restrictions on China’s silicon access, including limits on-chip performance and density. By Anirban Ghoshal Dec 06, 2023 3 mins CPUs and Processors CPUs and Processors Technology Industry Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe