News
6/17/2010
08:34 AM
George Crump
George Crump
Commentary
50%
50%

Keep Everything Forever, Part II - Indexing

In our last entry we reintroduced the idea of a keep everything forever storage retention strategy. We also touched on some of the basic capabilities like cost effective storage options and data movement options that can make a forever retention strategy realistic. In this entry we will look at what is one of the most important requirements the ability to find what you have in the archive.

In our last entry we reintroduced the idea of a keep everything forever storage retention strategy. We also touched on some of the basic capabilities like cost effective storage options and data movement options that can make a forever retention strategy realistic. In this entry we will look at what is one of the most important requirements the ability to find what you have in the archive.The fact that you have a keep it all retention strategy is going to be of little value to you if you can't find a discrete piece of information when you need it. Typically you are keeping all this data in case at some point down the road you need to produce it. Most often this will be in response to some sort of legal action or needing to prove adherence to a regulation. While you don't need rapid restore speed in these cases you do need to be able to deliver it in a timely manner. You can longer throw people at the problem and manually dig through information. In some cases you have to have a system in place that can not only find what you do have but also prove that you don't have something.

This comes down to implementing a solution that can index all the information that you have on storage and give you the ability to search on key words or phrases. I believe this index has to be storage vendor agnostic and potentially even device type agnostic. For example the ability that some backup applications have to build index information on the data that passes through it is good but the only thing being indexed is just that information that passes through the application. What about the data that does not get backed up by that application? Also what if you change your mind and switch applications? Are you really prepared to lock into a particular backup application for decades? And if you were do you think it is realistic to expect to send all your data through that application forever?

Beyond being storage and vendor agnostic the indexing system has to be able to scale to handle the ever growing amount of data that it will be responsible for. Scale here comes in two ways. The first is the ability to scale to meet ingestion rates. In other words how much information can the indexing system process in a given window? The other is how large can the meta-data that the indexing system creates scale to? If you are planning on keeping information forever that meta-data catalog's performance becomes critical.

The final piece also relates to the meta-data that the indexing system creates, how space efficient is the meta-data? You don't want to have to double your capacity requirements to hold all this meta-data, so the indexing system has to be able to capture the information it needs but do so very space efficiently.

Finding information in a keep it forever strategy is important, but probably most important is if you can actually afford to keep it forever. Our final entry in this series will cover trying to determine if a keep it forever strategy is cost effective.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.