No more dodging storage security


This article can also be found in the Premium Editorial Download "Storage magazine: Boosting data storage array performance."

Download it now to read this article plus other related content.

Security seeking storage
There's one final trend worth discussing, although it doesn't fit into the storage security category. Ironically, security professionals will seek out their storage brethren for help in dealing with massive storage capacity growth in 2006.

Unbeknownst to the storage universe, security is crossing its own chasm. Security vendors are getting better at capturing and consolidating myriad security data from vulnerability scanners, log files and even surveillance cameras. As a result, security investigation is moving from real-time reaction to historical analysis--much like databases evolved from transaction processing to data warehousing. This storage-centric security movement was recently illustrated by a joint announcement from security analysis software leader SenSage Inc. and EMC's Centera. This is just the tip of the iceberg.

Gray-haired storage professionals remember the capacity explosion caused by the data warehouse boom of the mid-1990s, so they should know what to expect with security data as we enter the last half of the decade. Storage chiefs should seek out the CISO and offer the storage group's help as soon as it's needed. This will make the storage team look like heroes and help to anticipate storage management problems that are sure to arise by the time we welcome in 2007.

Bottom line
The combination of data growth, intelligent storage networking and global connectivity are all the necessary ingredients

    Requires Free Membership to View

for a security nightmare cocktail. Forget about adding just a bit of security into the storage infrastructure. In 2006, we'll see layered defenses introduced into the storage infrastructure as storage teams quickly educate themselves on advanced security concepts.

What does this mean? Storage professionals must look beyond the storage infrastructure and figure out how to fit into overall enterprise security policies, defenses and data management. The functional walls between storage and security will crumble. It's going to be a busy year!

This was first published in January 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: