Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

8/2/2010
09:49 AM
George Crump
George Crump
Commentary
50%
50%

Managing The Mixed Storage Environment

In my last entry we covered the value of just having one device to manage. What if that is not realistic for your environment? Either you selected a storage system that won't scale, you have business reasons for multiple units or the environment is just too large, it needs to diverse to put everything on one storage platform. You need tools to allow the different systems to be managed more easily.

In my last entry we covered the value of just having one device to manage. What if that is not realistic for your environment? Either you selected a storage system that won't scale, you have business reasons for multiple units or the environment is just too large, it needs to diverse to put everything on one storage platform. You need tools to allow the different systems to be managed more easily.Tools can come in two flavors. First is the classic storage resource management (SRM) products. If you have not looked at these systems in a while I encourage you to give them another review. Most SRM systems now can effectively manage a diverse array of storage manufacturers and storage environments like VMware or Oracle as well as backup software management and monitoring as well. These systems can answer questions like where is my most available area of storage or which host is taking the least advantage of the available bandwidth and storage I/O resources. Some will even simulate the impact of moving a virtual machine from one host to another.

Second there are the tools that can get different storage systems from different manufacturers to act as one. This often involves some form of storage virtualization. These storage virtualization solutions work at either a file level or block level and can get systems from a variety of vendors to be able to be interacted as one, meaning that actions can be taken universally across different storage manufacturers. In some cases, as we describe in our article "What is File Virtualization?", this can be relatively non-disruptive. File virtualization allows you to set file movement policies based on parameters like age, size, type or owner. This does not require too much change to the infrastructure, although individual NAS data service functions (i.e. not file management) have to be done from the GUI of that manufacturer's NAS appliance.

Block virtualization systems will vary but typically require a deeper commitment to that vendor and the data services they provide. However once that commitment is made the payoff is the storage software and it's services that used to be embedded into the controller of the storage system is now abstracted into software. This allows a mixed hardware vendor environment to be managed as one. It also allows for flexibility on all future purchases since almost anything can be added to the environment and still managed with the same interface. Most storage virtualization products are software based or appliance based and have the ability to scale performance to match capacity by clustering in additional nodes. Some can now run as virtual machines with in a server virtualization environment.

While having one storage platform is ideal, if that simply is not realistic for you then there are options that can provide much of the management simplicity of a single system. They then can also bring some added benefits of reduced vendor lock-in.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.