News Stay informed about the latest enterprise technology news and product updates.

Jamie Gruener talks about marking storage decisions

Jamie Gruener talks about marking storage decisions

Jamie Gruener
Senior Analyst of Enterprise Computing and Networking at Yankee Group
In his role at Yankee Group, Jamie covers the storage market and is responsible for delivering expert insight on storage networking standards and emerging storage technologies. His areas of expertise include SAN management and virtualization. His research also covers carrier integration of storage technology, content distribution, server technologies and the storage service provider market.

QUESTION: Do you see an increasing trend in Web storage where users can get to their data/information from anywhere? How would this development effect an organization's (now and future) storage decisions? How do you strike a balance between corporate data vs. personal data taking into consideration security, performance and accessibility?

ANSWER: The key is security. Customers need to examine how making storage available to users over the Internet can be safeguarded so that only the owners of that storage actually can access it. I would argue that the best way to make sure the data is safe is to extend your existing corporate security strategy to encompass the classes of data (mission-critical, business operational, reference and archival) so that you can set different classes of security for each. Also ask storage vendors what their strategies are for increasing storage security. A number of vendors have ignored this issue, thinking it wasn't relevant to their businesses. The more customers ask these vendors what they have in place to help with storage security, the better the vendors' answers. There are a number of new startups focused on storage security that customers should consider as well.

As for the issue around corporate and personal data, set a specific policy with users that outlines what is acceptable data to be saved on corporate storage systems. You then enforce these policies with an SRM tool that tells you who owns the data, what it is and how much space it is taking up.

Dig Deeper on Data storage strategy

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.