Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/8/2009
12:05 PM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage's Next Move: Archive

Cloud storage for the most part is being used today as a backup medium or for collaboration, but the next big step and where cloud storage may be at it's best is an archive repository to meet the enterprise's growing data retention and compliance demands.

Cloud storage for the most part is being used today as a backup medium or for collaboration, but the next big step and where cloud storage may be at it's best is an archive repository to meet the enterprise's growing data retention and compliance demands.Cloud archive as we detail in our white paper Using Cloud Archive", may end up being the sweet spot for cloud storage and vendors like Iron Mountain, Bycast and Nirvanix are moving to address that market.

A cloud archive delivers the same data center efficiencies of a traditional archive; by reducing primary storage consumption needs and lowering requirements on the backup infrastructure while establishing the foundation for retention and compliance. The advantage of archiving to the cloud for the typical data center is that it removes most of the upfront costs associated with establishing your own archive as well as the management of those data assets long term.

There seems to be two deployment models evolving. First a service only sort of approach where nothing is installed locally and all data is shipped and organized directly to the cloud. Companies like iForem are ideal for this type of specific file retention need, especially for small business.

For larger businesses there may be too much data to actively push it all to the cloud as it is archived. For those there is the use of a hybrid model where an appliance that looks like a NAS head is deployed within the data center and then, based on policies, replicates data to the cloud archive provider. The local appliance can serve essentially as a cache and immediately migrate data to the cloud archive or it can serve as a secondary tier by copying the data to the cloud for redundancy and waiting until it runs out of local disk space before removing its own copy of the data.

Not only does the hybrid model deliver local recall performance it also enables the use of storage agnostic capacity optimization technologies like those from Storwize or Ocarina Networks. As we discussed in our article "Deduplicating in the Cloud", because of the monthly charge for capacity the cloud is an ideal area to make sure the data being stored is at its most optimized since the savings is seen with each monthly bill.

From a capacity perspective, cloud archive may end up being the most heavily utilized cloud service and it also may be the most "ready" of any cloud service. While there is room for improvement, something we will discuss in an upcoming entry, in its current form it provides immediate relief to a problem that today's data center is facing.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...