2005 Storage Year In Review

WWPI.com has published “2005 Storage Year In Review”.

If information is the lifeblood of business, then preserving data is the lifeblood of storage. In 2005, stored information was subject to more threats than ever: mayhem, viruses, worms, human error, natural disasters (think Katrina) and infrastructure failure (think the entire East Coast going dark.) Along with compliance, litigation discovery, and business value pressures, real storage costs are going through the roof.

“These pressures are threatening the existence and recovery of fast-growing data volumes. Stored data used to grow at the rate of 30 to 50 percent per year, and is now reaching levels of 60 to 80 percent per year. Some industries are experiencing 100 percent growth”.

Some of the most important and interesting of the storage technologies include “backup and recovery, archiving, tiered storage, storage networking, interconnects, CDP, NAS, iSCSI SANs, virtualization, security and encryption, and virtual tape”.

Backup and recovery have been with us since the beginning of the written word. However, once a piece of data is recorded, how do you protect it so it can be recovered and consulted as needed? “The threat runs through all sizes of business. Enterprise and mid-market are particularly affected because of their volume of data and pressures of compliance, governance, and litigation pressures”.

“Unstructured data is complicating the issue. Structured data volumes are growing, but the number of emails and unstructured files are exploding. Meanwhile, backup windows are shrinking to nothing while customer service demands and expectations are strong and getting stronger. All of these pressures strongly impact backup and recovery – with an emphasis on recovery. A major trend in 2005 was the growing reliance and demand on recovery. Backup doesn’t go away, but the only real reason to backup is being able to get the data back again. This means being able to search more powerfully and being able to restore much faster, in response to data loss, increased regulation and legal discovery”.

“Archiving remains a separate technology from backup, although there is still some confusion in the marketplace and it is possible to use backup as an archiving engine”.

“The move to intelligent archiving requires use of disk in archiving schemes… Businesses can use disk in long-term archives where it can be categorized and indexed for data recovery operations. Along with disk-based data replication to different locations, business can protect its information better than ever before.”

Glenn Groshans, a Director of Product Marketing at Symantec, peered into his crystal ball. “What we see over the long haul is that backup and archiving are merging so you have a single policy for data protection over time. It is true that today they’re separate applications for separate things, but ultimately they’ll be in one storage management policy including replication, SRM, backup and recovery, and archiving. These are four separate operations now, but they will be singly managed.”

The full review is available at wwpi.com.


This blog is run by the authors of FindProtected.
FindProtected is an effective security program that allows you to search your network for password protected files. With FindProtected, you can properly identify protected files and relocate them if necessary.

Leave a Reply