PRO+ Premium Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 6 No. 11 January 2008

Log data deluge

Enterprise-wide log data collection and analysis has become a multiterabyte-scale issue driven by security, compliance and IT operations, says Jon Oltsik, senior analyst at Enterprise Strategy Group. His recent report says 40% of large organizations collect at least 1TB of log data monthly. More business intelligence and reporting functions are needed, says Oltsik, as well as more consolidated IT efforts toward log data, which is necessary when investigating a security breach or slow application. Vendors are addressing the issue, but large enterprises aren't necessarily on top of the problem. "No one's not [collecting and] analyzing their data," he says. "There are certainly companies that aren't doing either one or both of those things well." Oltsik predicts a growing and divided market in the future, with some vendors focusing on log management infrastructure and others on analysis. "I really do believe there will be a bifurcation," he says. "There won't be many companies that do both." --Christine Cignoli

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • 8Gb/sec Fibre Channel widens lane for SAN traffic

  • Unlimited storage

    Clemson University has big plans as it upgrades its data center—and those plans call for lots and lots of storage. Their new IT infrastructure is being built along the lines of the National Science Foundation's Cyberinfrastructure initiative. Clemson expects its new world-class facility to attract a new crop of young faculty who will find the storage, bandwidth and CPU resources needed to support their research efforts.

  • Taming storage virtualization

    Where storage virtualization should reside and how it should be applied depends on the size of the storage infrastructure, the type of applications running in it, and the levels of control and visibility required by administrators. We look at the leading storage virtualization products and help you decide which technology may be best for your storage shop.

Columns in this issue