Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:27 PM
George Crump
George Crump

Do You Need Unified Storage?

As discussed in our last entry, unified storage is all the rage right now in the storage industry; it is essentiality the combining of NAS with a block protocol, like iSCSI or traditional fibre channel. The question is however do you need unified storage?

As discussed in our last entry, unified storage is all the rage right now in the storage industry; it is essentiality the combining of NAS with a block protocol, like iSCSI or traditional fibre channel. The question is however do you need unified storage?The answer is you should do everything that you can to drive down the cost to deploy and more importantly manage storage while at the same time maintaining the storage IO performance that your environment needs.

If you are going to have relatively balanced storage needs between the two service types (SAN and NAS) then it makes sense to look at unified storage. Unified storage implies that it will simplify storage management by having a single platform to deploy storage services (NAS or SAN) from. The area to look at in unified storage is how well the two services are integrated and does that really make it easier for you? Companies like SUN, NetApp, ONStor and Nexenta have all done a good job in providing a relatively smooth user experience.

Presenting unified storage as easier to use implies that managing two separate storage platforms is inherently harder. Many SAN systems are very easy to use now as are most NAS systems. Unless you are looking to unified storage as your first step into shared storage or if you have shared storage you can replace most of it with a unified solution, I don't see an inherent gain in ease of use by a unified system. While ease of use is there, it is also there in modern SAN or NAS only systems, so don't judge unified storage by ease of use alone. There is more to it.

The second area to look at is to make sure the unified system can sustain your performance requirements. If you are going to have a need to provide both SAN and NAS equally and have relatively modest performance requirements then the simplicity of the single platform may work in your favor. Understanding the performance requirements is critical. Many unified vendors also offer non-unified block focused storage systems for a reason, to address customers that need the higher-end performance of pure block based fibre channel SAN storage. Make sure you are comfortable with both the block I/O and file I/O performance of the unified system.

As always there are exceptions, and some vendors will claim that their unified block I/O performs as well as a non-unified block I/O system and it may be for your environment, just test it.

There comes a time when a focused storage system that specializes on block I/O or file I/O is a better fit. This can occur when your environment becomes heavily saturated with one of those storage services (SAN or NAS) and especially when there are immediate performance issues or long term scalability concerns. Companies like 3PAR and Isilon have made their mark by offering storage solutions that are designed to address performance and scalability while at the same time maintaining ease of use. As we discuss in our article "Searching for High Performance Storage" the need for high performance storage I/O is no longer limited to the lunatic fringe. Even SSD systems like those from Texas Memory or Violin Memory can be considered, non-unified storage and are clearly focused on solving a storage performance bottleneck.

The final area to explore with unified storage is to see if there is a significant cost savings. Basically can you deploy a single system that meets your performance demands and your storage services need at significantly lower price point? Especially in the mid-sized market this may be unified storage's key advantage. Most mid-sized organization simply can not muster the storage I/O performance to push todays storage systems anywhere close to their limits. It is simply more economical to have a single storage system do more than one task, potentially providing unified storage solutions a price advantage in this market.

To net it out, unified storage should be considered if you have mainstream performance requirements, a fairly balanced need of NAS and SAN services and if there is a compelling price advantage.

In our next entry we will explore another form of unified storage; virtualization appliances that can manage and unify multiple vendors storage hardware.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...