The right storage

September 2011 Information Security

Whether it is via mobile devices, databases or user generated, we are all generating a rapidly increasing amount of information and data around the globe. Chris Larkins, national presales manager at AxizWorkgroup, says that it does not matter where organisations are choosing to place this critical asset, as long as the environment of choice has the basics in place.

“A catastrophe for any organisation is when their storage limits their ability to do business,” says Larkins, “the chosen storage environment needs to provide relative performance, availability, security, modularity and most importantly ease of use and management.”

IT directors have got used to their day consisting of applications running out of capacity, viral videos overtaxing servers and missed deadlines to mention a few. These directors are now looking to innovative technical features and trends to accommodate the rapidly increasing information volumes.

Larkins says that thin provisioning is one such technical feature. He explains that this may not be a new concept but it is beginning to gain significant focus as a result of it being able to do more with less.

“The current economic climate has organisations watching costs even more closely than before and thin provisioning provides an important element in this situation,” says Larkins. Another affirmation for this solution is that it allows companies to buy storage as and when they require it. This enables users to take advantage of declining component costs, allows speedy response to changing business demands and maximises available funding.

Other storage solutions that are currently in the limelight include storage volume tiering and de-duplication. Larkins says that as the value of data changes for organisations, storage tiering provides the ability to move the data between disk types in the same logical volume ensuring that the most important and frequently used data is placed on drive technologies that provide the appropriate level of performance and availability. “By being able to move less accessed data to a larger and lower cost drive, organisations will realise an improved return on their high cost storage investments.”

De-duplication on the other hand, traditionally used as a backup solution, is another method to store more on less physical capacity, thereby making it easier to move the data around.

“One of the most interesting spaces to watch in South Africa is the bandwidth challenge,” says Larkins. “As providers make improved data bandwidth available at reduced costs we will see an increase in storage opportunities, unlocking public, private or hybrid cloud opportunities with multitenant capable devices. There is no doubt that this development will bring with it a cost effective disaster recovery and data availability solution. The industry is moving away from large form factor drives and fibre channel drives towards small form factor SAS-based drives and systems while capacity points continue to increase with declining costs resulting in more value for clients.

One of the newer trends is FCoE. This solution has allowed for storage traditionally accessed by using fibre channel components in the enterprise environment, to now be connected using Ethernet standards. FCoE leverages these traditional Ethernet skills making management easier.

When considering these technologies it is important for organisations that their chosen solution enables them to create structures swiftly and straightforwardly, move data around, back-up, replicate and most importantly that they are able to present the data. In conclusion Larkins says that as more data is generated, the more it needs to be made readily available, to allow users access to the information effectively and efficiently. “Ensuring that this is information is available of utmost importance.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...