Storage administrators have a number of possible options when looking to secure NAS and iSCSI IP-enabled storage devices, and deployment scenarios are a key factor in choosing the appropriate methods.