News
8/27/2009
11:49 AM
George Crump
George Crump
Commentary
50%
50%

Making Data An Asset

Data is often looked at as a liability; something that has to be stored, protected and preserved. Data storage has led to massively expanding storage environments and such initiatives as archive. Protection has led to incredibly elaborate backup and recovery schemes and preservation has led to eDiscovery and compliance. All of these processes are reactive, how can the view of data be changed to proactive, to using data as an asset?

Data is often looked at as a liability; something that has to be stored, protected and preserved. Data storage has led to massively expanding storage environments and such initiatives as archive. Protection has led to incredibly elaborate backup and recovery schemes and preservation has led to eDiscovery and compliance. All of these processes are reactive, how can the view of data be changed to proactive, to using data as an asset?The first step is to build on the preservation of the asset solutions and to broaden their scope. Preservation of data often involves some sort of eDiscovery component. These typically provide context based indexing and classification of data or a subset of data. Applying this type of technology to all your data could provide you with the ability to know not only where your data is but also what it contains. This then builds the foundation so that when a research request comes up, being able to find that information based on content and doing so in an instant is a key component into turning data into an asset.

Companies like Kazeon and Index Engines have built a good business in the litigation readiness space. Requiring the indexing of a smaller subset of data that you think there is a likelihood of a discovery request being generated against. What if some enterprise strength was added to these solutions so their use became more mainstream across all the data in the enterprise?

Part of such a solution will mean not requiring a never ending array of appliances to chew through more and more data. Ideally an IT manager wants the ability to plug in one box and index the enterprise in relatively quick order. Telling an IT manager that he needs 10 or 20 indexing appliances to index his enterprise is not going to be popular. The potential value in knowing exactly what is in the enterprise will be overshadowed by the implementation complexity and management of 10 to 20 additional pieces of indexing appliances. More efficient indexing will lead to simplified implementation and management that will lead to faster adoption.

More robust indexing is going to come from better algorithms and doing special application aware file examination to get through the data faster. For example Index Engines has done specific work around Microsoft Exchange that enables a much faster indexing timeframe on those stores.

To make data an asset eDiscovery has to expand into Enterprise Discovery. Mainstreaming data discovery across the enterprise will mean fewer indexing appliances that are application aware. As enterprise strength is added to what began as eDiscovery IT professionals can change the view of stored data from a liability to an asset, changing data from a cost center to an investment.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7178
Published: 2014-11-28
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.

CVE-2014-7850
Published: 2014-11-28
Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.

CVE-2014-8423
Published: 2014-11-28
Unspecified vulnerability in the management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to execute arbitrary commands via unknown vectors.

CVE-2014-8424
Published: 2014-11-28
ARRIS VAP2500 before FW08.41 does not properly validate passwords, which allows remote attackers to bypass authentication.

CVE-2014-8425
Published: 2014-11-28
The management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to obtain credentials by reading the configuration files.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?