As storage environments grow increasingly complex, the prospect of single-console management of heterogeneous storage becomes more and more appealing to storage administrators. That may
1. SRM software evaluation: Ten tips you should consider
Ten questions you should ask yourself about your needs and your environment when choosing storage resource management software.
2. Protect your data from hidden threats
There are a number of steps you can take to make sure that your environment is protected from hidden internal risks.
3. Hack your storage to test your security
In this tip, information security expert Kevin Beaver outlines various security tests you can perform, along with tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discovered otherwise.
4. Balance costs and demands for proper storage allocation
Learn how to balance costs and demands for proper storage allocation based upon your needs and environment.
5. Thirteen data retention mistakes to avoid
Information security expert Kevin Beaver outlines 13 retention mistakes storage administrators frequently make, and what you can do to avoid them.
6. SAN vs. NAS: Which do you need?
This tip will enable you to make a more informed decision on whether a NAS or SAN environment is best for the applications you need to deploy.
7. Out of capacity: What now?
This tip discusses how to avoid running out of storage capacity by evaluating your options, investigating re-allocation and knowing where to turn if you can't solve the problem yourself.
8. The rising cost of cheap storage
The commoditization of storage has been driving acquisition costs down for quite some time. However, hidden costs are now starting to surface as organizations struggle to manage hundreds of terabytes of data. This tip discusses some of the pitfalls of "cheap storage" and offers advice for keeping costs in check.
9. Three steps for evaluating a VTL product
This tip offers three helpful steps for evaluating a virtual tape library (VTL), virtual tape system or disk library and a template that can be used for comparison evaluations. Also, learn how and where VTLs can be used as part of an effective data protection strategy.
10. Guidelines for better iSCSI storage
Learn how segregating an iSCSI SAN, securing the management interface, employing authentication and disabling unnecessary network services can protect your data from malicious attacks.
Have a look at our library of Storage management tips.
This was first published in December 2006