Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/8/2009
12:05 PM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage's Next Move: Archive

Cloud storage for the most part is being used today as a backup medium or for collaboration, but the next big step and where cloud storage may be at it's best is an archive repository to meet the enterprise's growing data retention and compliance demands.

Cloud storage for the most part is being used today as a backup medium or for collaboration, but the next big step and where cloud storage may be at it's best is an archive repository to meet the enterprise's growing data retention and compliance demands.Cloud archive as we detail in our white paper Using Cloud Archive", may end up being the sweet spot for cloud storage and vendors like Iron Mountain, Bycast and Nirvanix are moving to address that market.

A cloud archive delivers the same data center efficiencies of a traditional archive; by reducing primary storage consumption needs and lowering requirements on the backup infrastructure while establishing the foundation for retention and compliance. The advantage of archiving to the cloud for the typical data center is that it removes most of the upfront costs associated with establishing your own archive as well as the management of those data assets long term.

There seems to be two deployment models evolving. First a service only sort of approach where nothing is installed locally and all data is shipped and organized directly to the cloud. Companies like iForem are ideal for this type of specific file retention need, especially for small business.

For larger businesses there may be too much data to actively push it all to the cloud as it is archived. For those there is the use of a hybrid model where an appliance that looks like a NAS head is deployed within the data center and then, based on policies, replicates data to the cloud archive provider. The local appliance can serve essentially as a cache and immediately migrate data to the cloud archive or it can serve as a secondary tier by copying the data to the cloud for redundancy and waiting until it runs out of local disk space before removing its own copy of the data.

Not only does the hybrid model deliver local recall performance it also enables the use of storage agnostic capacity optimization technologies like those from Storwize or Ocarina Networks. As we discussed in our article "Deduplicating in the Cloud", because of the monthly charge for capacity the cloud is an ideal area to make sure the data being stored is at its most optimized since the savings is seen with each monthly bill.

From a capacity perspective, cloud archive may end up being the most heavily utilized cloud service and it also may be the most "ready" of any cloud service. While there is room for improvement, something we will discuss in an upcoming entry, in its current form it provides immediate relief to a problem that today's data center is facing.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10062
PUBLISHED: 2021-05-13
The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attri...
CVE-2020-23995
PUBLISHED: 2021-05-13
An information disclosure vulnerability in ILIAS before 5.3.19, 5.4.12 and 6.0 allows remote authenticated attackers to get the upload data path via a workspace upload.
CVE-2020-23996
PUBLISHED: 2021-05-13
A local file inclusion vulnerability in ILIAS before 5.3.19, 5.4.10 and 6.0 allows remote authenticated attackers to execute arbitrary code via the import of personal data.
CVE-2021-29510
PUBLISHED: 2021-05-13
Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patche...
CVE-2021-23906
PUBLISHED: 2021-05-13
An issue was discovered in the Headunit NTG6 in the MBUX Infotainment System on Mercedes-Benz vehicles through 2021. A Message Length is not checked in the HiQnet Protocol, leading to remote code execution.