Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/8/2009
12:05 PM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage's Next Move: Archive

Cloud storage for the most part is being used today as a backup medium or for collaboration, but the next big step and where cloud storage may be at it's best is an archive repository to meet the enterprise's growing data retention and compliance demands.

Cloud storage for the most part is being used today as a backup medium or for collaboration, but the next big step and where cloud storage may be at it's best is an archive repository to meet the enterprise's growing data retention and compliance demands.Cloud archive as we detail in our white paper Using Cloud Archive", may end up being the sweet spot for cloud storage and vendors like Iron Mountain, Bycast and Nirvanix are moving to address that market.

A cloud archive delivers the same data center efficiencies of a traditional archive; by reducing primary storage consumption needs and lowering requirements on the backup infrastructure while establishing the foundation for retention and compliance. The advantage of archiving to the cloud for the typical data center is that it removes most of the upfront costs associated with establishing your own archive as well as the management of those data assets long term.

There seems to be two deployment models evolving. First a service only sort of approach where nothing is installed locally and all data is shipped and organized directly to the cloud. Companies like iForem are ideal for this type of specific file retention need, especially for small business.

For larger businesses there may be too much data to actively push it all to the cloud as it is archived. For those there is the use of a hybrid model where an appliance that looks like a NAS head is deployed within the data center and then, based on policies, replicates data to the cloud archive provider. The local appliance can serve essentially as a cache and immediately migrate data to the cloud archive or it can serve as a secondary tier by copying the data to the cloud for redundancy and waiting until it runs out of local disk space before removing its own copy of the data.

Not only does the hybrid model deliver local recall performance it also enables the use of storage agnostic capacity optimization technologies like those from Storwize or Ocarina Networks. As we discussed in our article "Deduplicating in the Cloud", because of the monthly charge for capacity the cloud is an ideal area to make sure the data being stored is at its most optimized since the savings is seen with each monthly bill.

From a capacity perspective, cloud archive may end up being the most heavily utilized cloud service and it also may be the most "ready" of any cloud service. While there is room for improvement, something we will discuss in an upcoming entry, in its current form it provides immediate relief to a problem that today's data center is facing.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...