Jenna Phipps

Jenna Phipps is a staff writer for Enterprise Storage Forum and eSecurity Planet, where she covers data storage, cybersecurity and the top software and hardware solutions in the storage industry. She’s also written about containerization and data management. Previously, she wrote for Webopedia. Jenna has a bachelor's degree in writing and lives in middle Tennessee.
136 articles written
0 comments made

M.2 vs SATA: Which Is the Best...

M.2 and SATA are two different storage technologies. Learn the differences between M.2 and SATA and which one is better for your needs.

How to Prepare for a Storage Area...

Conducting a storage area network security audit is a good starting point to reveal both the weaknesses and strengths...

10 Best Open Source Storage Software for...

These 64 Open Source Storage Projects help you create a NAS/SAN device, set up cloud storage, backup your system & more. Click here now.

Top 10 Vulnerability Scanning Software & Tools...

Vulnerability scanning software helps organizations monitor their networks, systems, and applications for security vulnerabilities. Security teams use vulnerability scans...

Pure Storage FlashBlade//E Is a Major Milestone...

MOUNTAIN VIEW, Calif. — Data storage provider Pure Storage announced Pure Storage Flashblade//E for rapidly scaling unstructured loads of...

Storage Software Q&A With Chris Schin of...

Storage software technology continues to undergo rapid shifts. As enterprises' data needs multiply, storage providers have scaled their software...

Why Network-Attached Storage (NAS) Security is Important

Securing network-attached storage (NAS) environments gives companies confidence in their data protection. Enterprise NAS systems often store sensitive company...

7 Different Types of Firewalls & Deployment...

Firewalls protect the outside of a network and the storage systems and applications housed on the inside of that...

How to Secure NAS: Best Practices &...

To sufficiently protect network-attached storage (NAS) systems against cyberattacks, companies must implement tightened access controls, strong network security, and...