25.11.2014 Views

Hong Kong Computer Society - enterpriseinnovation.net

Hong Kong Computer Society - enterpriseinnovation.net

Hong Kong Computer Society - enterpriseinnovation.net

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sponsored Feature<br />

Since 90% of the content will be the same<br />

each day, it is a major advantage if your<br />

system can execute de-duplication of the<br />

contents. Volumes of email can typically<br />

be reduced by 30% by removing duplicated<br />

attachments and identical documents circulated<br />

to many addresses, for example.<br />

Databases can be reduced by up to 90% of<br />

their volume. Using de-duplication technology<br />

reduces storage volume and costs and<br />

speeds retrieval.<br />

Disaster recovery<br />

Another crucial need is for a disaster<br />

recovery strategy to ensure that a usable<br />

copy of the enterprise data is available if<br />

the primary site is completely unavailable<br />

for any reason. Relying on a tape archive<br />

is inviting problems – tapes may so easily<br />

be lost, stolen or destroyed and even when<br />

they are available, restoration of service is<br />

slow.<br />

Today large or small enterprises should<br />

look into real-time data replication on<br />

disk, linked with telecom lines. The ideal<br />

is real-time mirroring, using a system<br />

such as the IBM SVC (SAN Volume Controller),<br />

an appliance that can virtualize<br />

different brands of disks for data mirroring.<br />

Enterprise and mid-range solutions<br />

are also available.<br />

There are three storage tiers commonly<br />

used for enterprises:<br />

Tier 1: Continuous, online, transactional<br />

data mirroring.<br />

Tier 2: Flashcopy, a snapshot technology,<br />

which can easily protect data at intervals<br />

of an hour or less, with recovery in the<br />

same period. Suitable for applications such<br />

as email and database, for example.<br />

Tier 3: Basic restore within one day, or<br />

suitable for long retention restoration requirements.<br />

The security of data at rest<br />

Most enterprises are tackling <strong>net</strong>work<br />

data security fairly actively, but numerous<br />

serious security breaches result from the<br />

theft or loss of ‘data at rest’ on tape cartridges,<br />

USB thumb drives, notebooks and<br />

disk drives removed for service. Even PCs<br />

or servers can disappear from data centers<br />

on occasion. The most common such<br />

problem arises with routine servicing of disk<br />

drives or when they are removed for redeployment<br />

or retirement. Although we like to<br />

trust service vendors that handle storage<br />

www.cw.com.hk<br />

Tier 1<br />

Systems can provide full<br />

data mirroring and higher<br />

read and write performance:<br />

<br />

series<br />

<br />

series<br />

<br />

<br />

<br />

<br />

devices, once a drive is removed from the<br />

storage appliance, it is impossible to guarantee<br />

that its content will not fall into the<br />

wrong hands.<br />

It is difficult to permanently delete the<br />

data on a hard drive. Degaussing (mag<strong>net</strong>ic<br />

obliteration) is expensive and troublesome,<br />

while physical destruction of the disk is obviously<br />

not appropriate if it is intended for<br />

re-use. The disk can be stored indefinitely<br />

by the owner, but this will also prevent its<br />

re-use.<br />

A complete solution is now available in<br />

52% of managers don’t have confidence in their<br />

enterprise data, while 59% admit to missing vital<br />

information.<br />

the form of self-encrypting disks. These devices<br />

encrypt all stored data as it is written,<br />

and decrypt all content as it is read, without<br />

any external application or encryption key.<br />

This means when the drive is removed for<br />

servicing, redeployment or retirement, the<br />

data on it cannot be read by any party. IBM<br />

experience is that 90% of drives returned<br />

for warrantee service have readable data<br />

on them. Nor can the drive be installed in<br />

any other hardware, unless it is reformatted<br />

in a secure way which absolutely destroys<br />

the current data.<br />

Most important, the encryption and decryption<br />

processes are completed with<br />

no performance overhead whatsoever.<br />

One of the largest reasons why enterprises<br />

users resist encryption is that<br />

conventional encryption methods have a<br />

processing overhead that slows system<br />

performance for all applications. Self-encrypting<br />

disks use a different technology<br />

that eliminates performance loss and operation<br />

efforts.<br />

Data Availability Tiers<br />

<br />

Tier 2<br />

<br />

management:<br />

<br />

<br />

series<br />

<br />

series<br />

<br />

<br />

<br />

<br />

Tier 3<br />

<br />

<br />

<br />

<br />

System<br />

The outlook for self-encryption<br />

There is already a strong trend in place<br />

to protect ‘data at rest,’ including thumb<br />

drives, tapes and laptops and special technologies<br />

have been developed for that purpose.<br />

Part of the reason is compliance with<br />

government and professional regulations<br />

that require that data is protected using the<br />

best technology available.<br />

Most enterprises have suffered some<br />

cost or inconvenience related to the disposal<br />

of hard drives. Within one or two<br />

years, most users may adopt self-encrypting<br />

drives as a solution. The advantages<br />

are very real, while the additional cost is<br />

negligible, and there is no performance<br />

impact – the encryption process is transparent<br />

to users.<br />

IBM is already providing self-encrypting<br />

hard drives as an option with storage appliances<br />

such as:<br />

• DS5000 Mid-range series and<br />

• DS8000 Enterprise class storage<br />

servers<br />

IBM’s self-encrypting hard drive also provides<br />

an ‘Instant Secure Erase’ function<br />

that enables users to safely redeploy disks<br />

with no possibility of readable data remaining<br />

on them. Early adopters are the finance<br />

industry, driven by compliance. It is likely<br />

that they will become standard in the enterprise<br />

environment over the next two or<br />

three years.<br />

Enrol for the IBM Information<br />

Infrastructure workshop on Nov 12 at:<br />

www.ibm.com/hk/events/DS5020/<br />

or contact Ms Yeung at<br />

2825 6140.<br />

Nov 2009 <strong>Computer</strong>world <strong>Hong</strong> <strong>Kong</strong> 15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!