Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

6/16/2008
12:42 PM
George Crump
George Crump
Commentary
50%
50%

Storage Consolidation, The Foundation

As a business grows and the demands on IT increase, there comes a point where the young data center has to consider such initiatives as server virtualization, advanced backup software, disk-to-disk backup, and deployment of its first SAN or NAS. Storage consolidation via a networked storage solution (be it SAN, NAS, or both) provides a foundation for those other early initiatives and is a logical first step.

As a business grows and the demands on IT increase, there comes a point where the young data center has to consider such initiatives as server virtualization, advanced backup software, disk-to-disk backup, and deployment of its first SAN or NAS. Storage consolidation via a networked storage solution (be it SAN, NAS, or both) provides a foundation for those other early initiatives and is a logical first step.Consolidated storage as a data protection aid

One of the biggest challenges facing most backup solutions today is the requirement to move a fairly large amount of data across the IP network and to do so in a relatively short period of time. Most if not all network-based arrays have the ability to create snapshots. This allows you to present an image of the volume to a backup server and perform an off-host backup of that data. This can reduce the amount of pressure needed to select and implement both a new backup software application and disk-to-disk backup. A consolidated storage platform shouldn't replace either of these initiatives but can provide more time to make the selection and enhance those applications when they're selected.

Most consolidated storage solutions also provide the ability to replicate changed blocks to another facility providing DR functionality. While not a complete solution because you have to plan on how to bring those servers and users online in the disaster site, it's another key foundation, and a large part of the battle is getting the data out of the facility.

Consolidated storage as a virtualization aid

Consolidated storage also is a key foundation for server virtualization and enables capabilities like virtual server movement, what Virtual Iron calls LiveMigration and VMware calls VMotion. The ability to move virtual machines between physical virtual machines requires network storage. Server virtualization solutions also rely on consolidated storage-replication capabilities to enable their DR solutions.

Consolidate storage for storage management

A consolidated storage solution can improve storage resource management, and while it certainly improves on what can be done as compared with standalone storage, it wasn't until storage virtualization that significant progress was made in the provisioning and management of storage. Virtualized consolidated storage makes the provisioning of consolidated storage significantly easier and faster. By enabling simplified volume provisioning, companies like Compellent and Lefthand Networks are making consolidated storage solutions available to a broader audience. Add to that Compellent's Thin Provisioning capabilities as outlined in a prior entry and the value of these solutions increases significantly.

Consolidated storage is the logical first step for a growing data center. As to how to select the right solution for your data center, stay tuned...

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.