Top 10 storage management tips 2006

As storage environments grow increasingly complex, the prospect of single-console management of heterogeneous storage becomes more and more appealing to storage administrators. That may

Requires Free Membership to View

be fantasy for now, but the industry is certainly buzzing about the storage resource management (SRM) software available now, even though many analysts agree that these products have significant limitations. Below are the top ten storage management tips of 2006, based on our readers' interest, covering such topics as SRM software evaluation, storage provisioning, security, storage capacity planning and more. Get started learning now.

1. SRM software evaluation: Ten tips you should consider
Ten questions you should ask yourself about your needs and your environment when choosing storage resource management software.

2. Protect your data from hidden threats
There are a number of steps you can take to make sure that your environment is protected from hidden internal risks.

3. Hack your storage to test your security
In this tip, information security expert Kevin Beaver outlines various security tests you can perform, along with tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discovered otherwise.

4. Balance costs and demands for proper storage allocation
Learn how to balance costs and demands for proper storage allocation based upon your needs and environment.

5. Thirteen data retention mistakes to avoid
Information security expert Kevin Beaver outlines 13 retention mistakes storage administrators frequently make, and what you can do to avoid them.

6. SAN vs. NAS: Which do you need?
This tip will enable you to make a more informed decision on whether a NAS or SAN environment is best for the applications you need to deploy.

7. Out of capacity: What now?
This tip discusses how to avoid running out of storage capacity by evaluating your options, investigating re-allocation and knowing where to turn if you can't solve the problem yourself.

8. The rising cost of cheap storage
The commoditization of storage has been driving acquisition costs down for quite some time. However, hidden costs are now starting to surface as organizations struggle to manage hundreds of terabytes of data. This tip discusses some of the pitfalls of "cheap storage" and offers advice for keeping costs in check.

9. Three steps for evaluating a VTL product
This tip offers three helpful steps for evaluating a virtual tape library (VTL), virtual tape system or disk library and a template that can be used for comparison evaluations. Also, learn how and where VTLs can be used as part of an effective data protection strategy.

10. Guidelines for better iSCSI storage
Learn how segregating an iSCSI SAN, securing the management interface, employing authentication and disabling unnecessary network services can protect your data from malicious attacks.

Have a look at our library of Storage management tips.

This was first published in December 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.