Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

8/8/2008
05:17 PM
George Crump
George Crump
Commentary
50%
50%

SMB Archiving

Data retention and archiving aren't just for large enterprises. Small to medium-sized businesses need to be concerned about e-mail retention, data retention, and data archiving. I know the first response is, "We are not a public company, we don't have to worry about that." You might be right, but the need to retain and store e-mails and other forms of data goes well beyond being a public company. While I won't go into all the reasons why, here are some simple ones:

Data retention and archiving aren't just for large enterprises. Small to medium-sized businesses need to be concerned about e-mail retention, data retention, and data archiving. I know the first response is, "We are not a public company, we don't have to worry about that." You might be right, but the need to retain and store e-mails and other forms of data goes well beyond being a public company. While I won't go into all the reasons why, here are some simple ones:1. Has your business ever been sued? 95% of all discovery requests involve e-mail. 65% now ask for other forms of data (office productivity, CAD diagrams, etc). You must be able to not only deliver this information quickly after the request, but also at the request you need to know what you have and state what you are planning to deliver. 2. Have any employees? Ever have any leave because they weren't happy or you weren't happy with them? (if you answered no to question one and yes to this question, go back and change your first answer to yes. 3. Ever need to reference a previous piece of work as a starting point to save time or to upgrade or add on? Data retention is not just about being prepared for bad things, it is also about using your digital assets as... well... an asset, to help you save time on the next project, addition or redesign. First let's look at e-mail, certainly the headline grabber. At almost any level within the small to medium-sized range of business, outsourcing e-mail archiving makes sense. Companies like LiveOffice and MessageOne (now Dell) are good examples. What makes LiveOffice interesting is how mature it is in the space, with more than 7,500 customers in eight years of business.

Data archiving is a little different. For the "S" part of SMB, cloud storage solutions makes sense, but as I said in an earlier entry, make sure those cloud companies have a focus on retention. A great example in this space is iForem, which manages retention on a specific file, and you pay for the file storage for life as opposed to an annual subscription. For data retention in the medium-sized business a totally outsourced solution should be compared with storing the data on-site. The first choice is how to move the data to the archive. Companies like Atempo and Enigma Data offer simple and reasonably priced solutions for the SMB market. In the Macintosh-based market of video and film production, MatrixStore is designed for that purpose and is ideal for Final Cut Pro and Final Cut Server work flows, offering long-term protection for the final cuts you need to keep. From a hardware perspective there is the traditional use of these archive tools to copy to cheap disk, but companies like ProStor Systems have specific archive storage focused on the mid-tier business. Their ingenious solution leverages ProStor's removable hard disk technology by front-ending it with a 1-9TB RAID disk which automatically moves data from these disks to the removable hard disks. Even though the files have been migrated they still appear to be local on the system, and if a file is not actually there when being accessed then the operator is prompted to insert the correct piece of disk media. This provides an efficient, power managed solution for the medium sized business.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed. George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16223
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16225
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16227
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by processing a specially crafted project file not validated when the data is entered by a user. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute a...