News
8/27/2009
11:49 AM
George Crump
George Crump
Commentary
50%
50%

Making Data An Asset

Data is often looked at as a liability; something that has to be stored, protected and preserved. Data storage has led to massively expanding storage environments and such initiatives as archive. Protection has led to incredibly elaborate backup and recovery schemes and preservation has led to eDiscovery and compliance. All of these processes are reactive, how can the view of data be changed to proactive, to using data as an asset?

Data is often looked at as a liability; something that has to be stored, protected and preserved. Data storage has led to massively expanding storage environments and such initiatives as archive. Protection has led to incredibly elaborate backup and recovery schemes and preservation has led to eDiscovery and compliance. All of these processes are reactive, how can the view of data be changed to proactive, to using data as an asset?The first step is to build on the preservation of the asset solutions and to broaden their scope. Preservation of data often involves some sort of eDiscovery component. These typically provide context based indexing and classification of data or a subset of data. Applying this type of technology to all your data could provide you with the ability to know not only where your data is but also what it contains. This then builds the foundation so that when a research request comes up, being able to find that information based on content and doing so in an instant is a key component into turning data into an asset.

Companies like Kazeon and Index Engines have built a good business in the litigation readiness space. Requiring the indexing of a smaller subset of data that you think there is a likelihood of a discovery request being generated against. What if some enterprise strength was added to these solutions so their use became more mainstream across all the data in the enterprise?

Part of such a solution will mean not requiring a never ending array of appliances to chew through more and more data. Ideally an IT manager wants the ability to plug in one box and index the enterprise in relatively quick order. Telling an IT manager that he needs 10 or 20 indexing appliances to index his enterprise is not going to be popular. The potential value in knowing exactly what is in the enterprise will be overshadowed by the implementation complexity and management of 10 to 20 additional pieces of indexing appliances. More efficient indexing will lead to simplified implementation and management that will lead to faster adoption.

More robust indexing is going to come from better algorithms and doing special application aware file examination to get through the data faster. For example Index Engines has done specific work around Microsoft Exchange that enables a much faster indexing timeframe on those stores.

To make data an asset eDiscovery has to expand into Enterprise Discovery. Mainstreaming data discovery across the enterprise will mean fewer indexing appliances that are application aware. As enterprise strength is added to what began as eDiscovery IT professionals can change the view of stored data from a liability to an asset, changing data from a cost center to an investment.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?