Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

11/18/2009
12:11 PM
George Crump
George Crump
Commentary
50%
50%

Don't Just Manage Your Data -- Know it

There are countless ways to manage data available to the storage manager today but most of these solutions look at data as a problem. Few take an asset view of data, understanding that it is something to be cultivated and leveraged for future use. Storage managers should do more than just manage their data, they should know it.

There are countless ways to manage data available to the storage manager today but most of these solutions look at data as a problem. Few take an asset view of data, understanding that it is something to be cultivated and leveraged for future use. Storage managers should do more than just manage their data, they should know it.Knowing your data means understanding what's inside of it, understanding its contents. Companies like CommVault, EMC, Kazeon and Index Engines all have the ability to understand and categorize the information inside of your files.

Much of the messaging being applied to this space has been around litigation readiness and response. This market, often called eDiscovery, is certainly a viable market but not very compelling to the IT manager unless they are currently being sued. These systems however, if they could be scaled more efficiently, can offer storage managers and their users access to data in a manner that would allow it to be mined for value, which would put users in a new era of IT Discovery.

This could be as simple as knowing that a certain type of data exists in the environment but not being able to find it. In this scenario, a user typically recreates the data they need, as best they can, after spending the time to search for it. Imagine being able to find information, enterprise-wide, in seconds and then use that data for a new project. It could be a tremendous time saver for the individual user (not to mention the frustration) and a capacity saver for the system administrator.

Data as an asset can move beyond just time savings and become more of a problem solver. Solutions to how to solve a challenge that the organization needs to address may have already been tackled. Again, with an IT Discovery capability, that information could be found and leveraged when faced with the same problem in the future.

The challenge facing these systems is one of scale. The time it takes to inspect the environment and create an index is a real challenge for some of these systems. While many can add multiple nodes to improve performance, the amount of nodes needed for this indexing process may be prohibitive. An alternative is to leverage a process that is already in place and already moving data. For example CommVault (on its product) and Index Engines (across multiple backup products) essentially leverage the fact that the backup process is bringing the data across the network, and let the inspection tap into that data stream to perform its analysis.

In the future this analysis could be set on some other inline appliance like file virtualization or automated tiering systems. For eDiscovery to become IT Discovery scaling of the analysis needs to be addressed. The meta-data database that represents all the content stored in the enterprise must be able to be updated quickly, as a multi-day, or in some cases week long, index process is not going to work for the broader environment. IT Discovery needs the ability to refresh its information more often than that.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...
CVE-2021-29446
PUBLISHED: 2021-04-16
jose-node-cjs-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...
CVE-2021-29451
PUBLISHED: 2021-04-16
Portofino is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. The issue will be patched in the upcoming 5.2.1 release.