News
8/8/2008
05:17 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

SMB Archiving

Data retention and archiving aren't just for large enterprises. Small to medium-sized businesses need to be concerned about e-mail retention, data retention, and data archiving. I know the first response is, "We are not a public company, we don't have to worry about that." You might be right, but the need to retain and store e-mails and other forms of data goes well beyond being a public company. While I won't go into all the reasons why, here are some simple ones:

Data retention and archiving aren't just for large enterprises. Small to medium-sized businesses need to be concerned about e-mail retention, data retention, and data archiving. I know the first response is, "We are not a public company, we don't have to worry about that." You might be right, but the need to retain and store e-mails and other forms of data goes well beyond being a public company. While I won't go into all the reasons why, here are some simple ones:1. Has your business ever been sued? 95% of all discovery requests involve e-mail. 65% now ask for other forms of data (office productivity, CAD diagrams, etc). You must be able to not only deliver this information quickly after the request, but also at the request you need to know what you have and state what you are planning to deliver. 2. Have any employees? Ever have any leave because they weren't happy or you weren't happy with them? (if you answered no to question one and yes to this question, go back and change your first answer to yes. 3. Ever need to reference a previous piece of work as a starting point to save time or to upgrade or add on? Data retention is not just about being prepared for bad things, it is also about using your digital assets as... well... an asset, to help you save time on the next project, addition or redesign. First let's look at e-mail, certainly the headline grabber. At almost any level within the small to medium-sized range of business, outsourcing e-mail archiving makes sense. Companies like LiveOffice and MessageOne (now Dell) are good examples. What makes LiveOffice interesting is how mature it is in the space, with more than 7,500 customers in eight years of business.

Data archiving is a little different. For the "S" part of SMB, cloud storage solutions makes sense, but as I said in an earlier entry, make sure those cloud companies have a focus on retention. A great example in this space is iForem, which manages retention on a specific file, and you pay for the file storage for life as opposed to an annual subscription. For data retention in the medium-sized business a totally outsourced solution should be compared with storing the data on-site. The first choice is how to move the data to the archive. Companies like Atempo and Enigma Data offer simple and reasonably priced solutions for the SMB market. In the Macintosh-based market of video and film production, MatrixStore is designed for that purpose and is ideal for Final Cut Pro and Final Cut Server work flows, offering long-term protection for the final cuts you need to keep. From a hardware perspective there is the traditional use of these archive tools to copy to cheap disk, but companies like ProStor Systems have specific archive storage focused on the mid-tier business. Their ingenious solution leverages ProStor's removable hard disk technology by front-ending it with a 1-9TB RAID disk which automatically moves data from these disks to the removable hard disks. Even though the files have been migrated they still appear to be local on the system, and if a file is not actually there when being accessed then the operator is prompted to insert the correct piece of disk media. This provides an efficient, power managed solution for the medium sized business.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed. George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

CVE-2014-4511
Published: 2014-07-22
Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.

CVE-2014-4911
Published: 2014-07-22
The ssl_decrypt_buf function in library/ssl_tls.c in PolarSSL before 1.2.11 and 1.3.x before 1.3.8 allows remote attackers to cause a denial of service (crash) via vectors related to the GCM ciphersuites, as demonstrated using the Codenomicon Defensics toolkit.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.