News Stay informed about the latest enterprise technology news and product updates.

The state of ILM

Editor's note: Welcome to our weekly column penned by storage community leaders. The opinions expressed here are not necessarily those of Interact with your peers about this here!

I was on a panel recently where the moderator asked if information lifecycle management (ILM) was real or just market hype. That's a tough question to answer in less than a minute, so I thought I would explore the question in this column. The whole ILM discussion can be very confusing, so the question of its legitimacy is valid. But the short answer is that it is very real, although no vendor is really delivering on the vision of end-to-end ILM just yet (no matter what is promoted in marketing material).

ILM is simple to understand if it is broken down by the actual practices that make up an ILM process: Data placement, data migration, data protection and data retention.

No vendor currently offers true end-to-end, automated ILM that integrates all of the software solutions required for implementation.
ILM is really about treating data differently, depending on its value to the business, and then placing the data on a specific resource, migrating the data to other resources as its value "degrades", protecting it accordingly throughout its lifecycle, and retaining the data for a duration that aligns with business needs. If we look at it this way, many companies are already implementing ILM practices. Plenty of users we survey already tier storage resources, placing their most valued data on highly available, high-performance arrays, and placing data from non-mission-critical applications on resources with "lesser" features. Those same users also protect the data on those resources differently, and retain specific data according to particular policies. So the bottom line is, users are already implementing ILM practices.

However, ILM, as it is being hawked by the vendors today, is actually about automating these practices, tying them together to deliver one seamless process. Ideally, data would be classified on creation, placed on the appropriate storage resource and automatically protected according to its value to the business (for instance the automated ILM process would ensure that database transactions were automatically replicated and backed up with continuous data protection (CDP) technology every time a change is made to the database). The automated ILM process would also enforce policies that determine when data should be migrated to different resources, perhaps moved to a less expensive resource or archived to tape. Finally, the ILM process would determine (again based on policies), how long the data would be retained, or when it is ultimately destroyed.

Automating the process end to end is the real challenge. These tasks require a number of different software solutions, including SRM software to analyze and monitor the data, migration solutions that move the data, as well as a number of different data protection solutions. A truly automated ILM process would require that all of these solutions are integrated, where policies are set in each software application, and when met trigger actions in the other applications.

For example, say an organization deems files from a certain owner very important and creates the following policies: If the files have not been accessed for three months, they should be moved to a lower cost array. When the files are created, they should be backed up every hour, but once migrated only backed up every day. After six months, if the files have not been accessed, they should be archived for three years. In order to automate this ILM process, SRM software would need to identify the users' files, monitor when they are accessed and trigger a data migration solution to move the file to a lower cost array after three months. When this move occurs, data protection software needs to be alerted, so the protection schema for the file is changed. Again, the SRM software has to monitor the file, now in a different location, and if it has not been accessed for six months, it should now trigger archival software to move the file to tape. The data protection software must be aware of this change as well. And of course, the applications should keep reports on all of this movement so the administrator knows exactly where the file is at all times.

Sound hard? It is. No vendor currently offers true end-to-end, automated ILM that integrates all of the software solutions required for implementation. Instead, there are a number of point solutions that provide SRM capability, automated migration for files, databases and e-mail, and of course, data protection. The real challenge will be tying them all together, which is a difficult task for any vendor.

So when asked if ILM is real? Yes, in theory. ILM practices are being implemented today -- but automating end-to-end ILM processes is something that vendors are diligently working on. So don't expect seamless integration of all of the software solutions for a few years at least. However, there is no reason users should not start implementing the pieces that are available today. Tiering storage, automating archiving and protecting data according to its value to the business all help reduce costs and increase performance -- which in the end is the ultimate goal of ILM.

About the columnist: Nancy Hurley is a senior analyst at the Enterprise Strategy Group and a regular columnist for

Dig Deeper on Data storage management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.