Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:50 AM
George Crump
George Crump

Simplify Your Existing Storage

Sometimes in storage you don't have the budget to go out and get the latest, greatest storage system that is going to make your life simpler. Sometimes you have to make due with what you have. That does not mean that you have to live without all the new capabilities that are becoming available in storage like improved provisioning and multiple protocols.

Sometimes in storage you don't have the budget to go out and get the latest, greatest storage system that is going to make your life simpler. Sometimes you have to make due with what you have. That does not mean that you have to live without all the new capabilities that are becoming available in storage like improved provisioning and multiple protocols.There are two ways to do this. Provide a management layer that gives you a view into existing storage. Most storage monitoring software tools will provide a centralized view of your storage from both an array and file system perspective. Some will even work within a virtualized environment to show you how storage relates to the virtual machines. Storage management software however can only do so much, most do not interact with the actual storage to perform functions and none can add capabilities to that storage. There are some applications that will automate some of the workflow around storage management tasks and communicate with the hardware. Frankly I wish we would see more of this.

If its your actual interaction with the storage hardware that is difficult or if some specific capabilities are lacking then storage software is needed to make the actual interaction with the hardware simpler and add capabilities. Most people think to simplify interaction or to add capabilities you have to replace the whole storage system, hardware and all. Reality is that storage software can effectively give your storage a brain transplant that makes it easier to deal with and adds capabilities.

Most storage software for example brings some form of storage virtualization to the equation, allowing multiple systems from multiple manufacturers to be managed from a single interface. That alone can simplify things, plus provides flexibility when making future purchases. They also allow provisioning to be made without having to know the details of the underlying storage system, just size the volume and assign it to a host. Some of the storage as software providers can do this in a thinly provisioned fashion so you can over-allocate storage but only actually consume that storage as it is needed.

Most of the storage as software suppliers do not have the advanced thin provisioning capabilities that a few of the major manufacturers have that can perform. This includes functions like thin migration and thin reclamation. They do have most of the other storage software basics like snapshots, multiple protocols (fibre, iSCSI) and replication. There is also the issue of moving your current storage under the management of the new storage software. A few of the storage applications will allow you to manage existing volumes without converting them, but to take advantage of all the capabilities like thin provisioning and storage virtualization you need to give full control of the storage hardware to the storage application.

Simplifying storage does not always require a switch to new hardware. Management or direct functionality can be added to existing storage hardware. Both have their pros and cons. The latest and greatest may bring the absolute latest in ease of use and functionality, but storage applications may be a viable alternative if the budget does not allow for a total refresh.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-25
A server-side request forgery (SSRF) vulnerability in Upgrade.php of gopeak masterlab 2.1.5, via the 'source' parameter.
PUBLISHED: 2021-02-25
Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents.
PUBLISHED: 2021-02-25
Stored cross-site scripting (XSS) in form field in robust.systems product Custom Global Variables v 1.0.5 allows a remote attacker to inject arbitrary code via the vars[0][name] field.
PUBLISHED: 2021-02-25
Magento UPWARD-php version 1.1.4 (and earlier) is affected by a Path traversal vulnerability in Magento UPWARD Connector version 1.1.2 (and earlier) due to the upload feature. An attacker could potentially exploit this vulnerability to upload a malicious YAML file that can contain instructions which...
PUBLISHED: 2021-02-25
Adobe Bridge version 11.0 (and earlier) is affected by an out-of-bounds write vulnerability when parsing TTF files that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.