News
8/27/2009
11:49 AM
George Crump
George Crump
Commentary
50%
50%

Making Data An Asset

Data is often looked at as a liability; something that has to be stored, protected and preserved. Data storage has led to massively expanding storage environments and such initiatives as archive. Protection has led to incredibly elaborate backup and recovery schemes and preservation has led to eDiscovery and compliance. All of these processes are reactive, how can the view of data be changed to proactive, to using data as an asset?

Data is often looked at as a liability; something that has to be stored, protected and preserved. Data storage has led to massively expanding storage environments and such initiatives as archive. Protection has led to incredibly elaborate backup and recovery schemes and preservation has led to eDiscovery and compliance. All of these processes are reactive, how can the view of data be changed to proactive, to using data as an asset?The first step is to build on the preservation of the asset solutions and to broaden their scope. Preservation of data often involves some sort of eDiscovery component. These typically provide context based indexing and classification of data or a subset of data. Applying this type of technology to all your data could provide you with the ability to know not only where your data is but also what it contains. This then builds the foundation so that when a research request comes up, being able to find that information based on content and doing so in an instant is a key component into turning data into an asset.

Companies like Kazeon and Index Engines have built a good business in the litigation readiness space. Requiring the indexing of a smaller subset of data that you think there is a likelihood of a discovery request being generated against. What if some enterprise strength was added to these solutions so their use became more mainstream across all the data in the enterprise?

Part of such a solution will mean not requiring a never ending array of appliances to chew through more and more data. Ideally an IT manager wants the ability to plug in one box and index the enterprise in relatively quick order. Telling an IT manager that he needs 10 or 20 indexing appliances to index his enterprise is not going to be popular. The potential value in knowing exactly what is in the enterprise will be overshadowed by the implementation complexity and management of 10 to 20 additional pieces of indexing appliances. More efficient indexing will lead to simplified implementation and management that will lead to faster adoption.

More robust indexing is going to come from better algorithms and doing special application aware file examination to get through the data faster. For example Index Engines has done specific work around Microsoft Exchange that enables a much faster indexing timeframe on those stores.

To make data an asset eDiscovery has to expand into Enterprise Discovery. Mainstreaming data discovery across the enterprise will mean fewer indexing appliances that are application aware. As enterprise strength is added to what began as eDiscovery IT professionals can change the view of stored data from a liability to an asset, changing data from a cost center to an investment.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

CVE-2014-9197
Published: 2015-01-27
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote attackers to obtain sensitive setup and configuration information via a direct request.

CVE-2014-9198
Published: 2015-01-27
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session.

CVE-2014-9646
Published: 2015-01-27
Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.