Feature

Consolidating remote offices

Ezine

This article can also be found in the Premium Editorial Download "Storage magazine: Surprise winner: BlueArc earns top NAS quality award honors."

Download it now to read this article plus other related content.

The ROBO security management issues users are concerned with are centralized user-access controls and directory services for server environments, application-based security, encryption for WAN appliances and routers, and local disk-encryption techniques for remotely located servers and storage.

Optimization
There are various techniques to reduce the amount of data stored at ROBOs or the amount of ROBO data sent to the main data center. There's a significant amount of innovation regarding the optimization of WAN bandwidth, data capacities, replication workloads, and protocol or application delivery, to name some major areas. As such, an organization's optimization approaches constitute the third critical element of any ROBO infrastructure.

Our survey finds users prefer to optimize data at the source. This makes sense, but if data is to be transported back to the main data center to take advantage of a consolidated infrastructure, it's critical to deploy optimization technologies to increase WAN utilization, decrease storage consumption and streamline data protection (see "Preferred approaches for ROBO data optimization").

These optimization approaches can work with any kind of ROBO consolidation strategy. Today's WAN optimization tools that "fill the pipe" are architecturally neutral to

Requires Free Membership to View

resource consolidation. Similarly, data-at-rest optimization works just as well at the edge of the enterprise as it does at the core. For those engaging in consolidation, that's the impetus to learn how some of the more advanced distributed backup and replication platforms can radically reduce transmitted data across the WAN. Users should view their optimization approach as a leverage point to control the shape and cost of their ROBO, regardless of how aggressively they're engaged in a consolidation strategy.

This was first published in June 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: