News
8/27/2009
11:49 AM
George Crump
George Crump
Commentary
50%
50%

Making Data An Asset

Data is often looked at as a liability; something that has to be stored, protected and preserved. Data storage has led to massively expanding storage environments and such initiatives as archive. Protection has led to incredibly elaborate backup and recovery schemes and preservation has led to eDiscovery and compliance. All of these processes are reactive, how can the view of data be changed to proactive, to using data as an asset?

Data is often looked at as a liability; something that has to be stored, protected and preserved. Data storage has led to massively expanding storage environments and such initiatives as archive. Protection has led to incredibly elaborate backup and recovery schemes and preservation has led to eDiscovery and compliance. All of these processes are reactive, how can the view of data be changed to proactive, to using data as an asset?The first step is to build on the preservation of the asset solutions and to broaden their scope. Preservation of data often involves some sort of eDiscovery component. These typically provide context based indexing and classification of data or a subset of data. Applying this type of technology to all your data could provide you with the ability to know not only where your data is but also what it contains. This then builds the foundation so that when a research request comes up, being able to find that information based on content and doing so in an instant is a key component into turning data into an asset.

Companies like Kazeon and Index Engines have built a good business in the litigation readiness space. Requiring the indexing of a smaller subset of data that you think there is a likelihood of a discovery request being generated against. What if some enterprise strength was added to these solutions so their use became more mainstream across all the data in the enterprise?

Part of such a solution will mean not requiring a never ending array of appliances to chew through more and more data. Ideally an IT manager wants the ability to plug in one box and index the enterprise in relatively quick order. Telling an IT manager that he needs 10 or 20 indexing appliances to index his enterprise is not going to be popular. The potential value in knowing exactly what is in the enterprise will be overshadowed by the implementation complexity and management of 10 to 20 additional pieces of indexing appliances. More efficient indexing will lead to simplified implementation and management that will lead to faster adoption.

More robust indexing is going to come from better algorithms and doing special application aware file examination to get through the data faster. For example Index Engines has done specific work around Microsoft Exchange that enables a much faster indexing timeframe on those stores.

To make data an asset eDiscovery has to expand into Enterprise Discovery. Mainstreaming data discovery across the enterprise will mean fewer indexing appliances that are application aware. As enterprise strength is added to what began as eDiscovery IT professionals can change the view of stored data from a liability to an asset, changing data from a cost center to an investment.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

CVE-2015-0915
Published: 2015-05-21
Cross-site scripting (XSS) vulnerability in RAKUS MailDealer 11.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted attachment filename.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.