Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

8/20/2009
09:36 AM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage As An On Demand Data Archive

The challenge that most archive systems have is they are too big for the job. Some organizations, especially in the small to medium sized business market, may not want or need to move all their inactive data to a secondary storage tier, yet they know they have specific electronic documents that from time to time need to be retained and locked down.

The challenge that most archive systems have is they are too big for the job. Some organizations, especially in the small to medium sized business market, may not want or need to move all their inactive data to a secondary storage tier, yet they know they have specific electronic documents that from time to time need to be retained and locked down.Depending on whose research you believe, in the typical data center 80% or more of the data on primary storage has not been accessed in the last 90 days. The traditional archive method is to move all or most of the data set to a secondary storage tier. For large businesses and enterprises archiving is an extremely cost effective way to reduce primary storage expenditures.

For medium sized and smaller data centers they often have enough capacity or the cost savings to move to an archive does not justify the expense in establishing that archive. In many cases it is easier and in some cases less expensive for them to just expand their primary storage investment. As we describe in our article "Archiving in Place" with the right technology primary storage can be expanded in a way that allows older data to spin down and not require the power and cooling required that it used to.

While these organizations may not see the value in archiving as a way to cut primary storage cost, these organizations still have email, documents and other forms of data that need to be archived for the traditional data retention reasons and to be able to have a verifiable original. Doesn't it make more sense to make sure those specific documents are retained and available for safe keeping instead of managing a huge archive full of data that you will likely never need?

Medium sized and larger organizations can benefit from either a hybrid cloud solution or archive solution as we demonstrate in our latest video on Cloud Archive. Companies like Iron Mountain, Nirvanix and others allow organizations to archive specific content, email or other data to the cloud without the need for purchasing a large storage platform internally. The organization just pays for the capacity they use. Since the focus of this use case is retention, not just dumping old data, they need to make sure their cloud provider can provide capabilities like Write Once Read Many (WORM) storage as well as time or event based retention of data.

Smaller organizations may be able to be even more granular in the data that they want to retain and lock down. For example contracts, signed proposals or statements of work, customer purchase orders, copies of tax filings and the like. All are done electronically today and most small businesses later print these documents and then file them. All of these documents need to be locked down in a manner that is tamper proof. Instead these organizations should look to services like those from companies like iForem where data retention is charged on a per file basis for the lifetime of the file, no monthly membership to remember, just store the data one time and your done.

In either case, medium and smaller organizations can count on backup for the "never need data", while not perfect data can be recovered, just in case you do end up needing it. It is still finding the needle in the haystack, but at least you can get to it. For the retained data where you know there is a higher expectancy on need, it needs to be put in a smaller haystack that is secure, searchable, reasonably quick to access and potentially stored in a WORM format. That way when you do need this information you can prove it was in an immutable form.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8720
PUBLISHED: 2020-08-13
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
CVE-2020-12300
PUBLISHED: 2020-08-13
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-12301
PUBLISHED: 2020-08-13
Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-7307
PUBLISHED: 2020-08-13
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.
CVE-2020-8679
PUBLISHED: 2020-08-13
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.