Feeds

Poor change control hits SAN expansion plans

Storage management is hard to teach - Sagitta

  • alert
  • submit to reddit

3 Big data security analytics techniques

Robust change control and security will be the two biggest headaches for SAN users as they try to integrate and expand their storage network infrastructures, says Andy Norman, founder and CEO of UK storage specialist Sagitta.

"Most of the problems we've seen have been consequences of poor planning and change control," he says. "Not poor planning on paper necessarily, but in not understanding the technical implications of change."

He gave the example of a company which took offline half of an array used for data replication. Traffic into the other half climbed as a result and the whole thing failed.

"It's that high level infrastructure understanding and it can't be exhaustively taught," he says. "Storage managers learn the basics, but the high level stuff comes from having been there and done that kind of thing a lot already."

He adds that, as storage networks grow in complexity, users may try to circumvent the shortage of storage management skills by bringing in external help, but that this brings risks of its own: "There are general security issues here - people could break in unless you think of all the blocks that need to be in place."

Norman was speaking as Sagitta added an ongoing SAN support service to its existing plan, design and implement services. This eXpert Support Service includes capacity planning, auditing, configuration and change management, and 24x7 remote monitoring.

One of the first customers for the new service is West Yorkshire Police, which has hired Sagitta to manage the storage behind its new Linux-based video identity parade system.

A key part of eXpert Support Service is Sagitta's own WatchDog software, which monitors the whole storage infrastructure. Norman says this is specifically designed to support the service and simplify administration, not to enhance or sell SAN hardware.

"We position it carefully," he says. "It's not management, and you don't lose control. A server in the customer site collects and filters data and the customer can view it too - a lot of them make use of that. Also, we do it in a way that's culturally-secure."

He says that Sagitta is open to transferring skills to the customer, or letting the customer outsource certain skills: "It ties back to a research project we did last year, which said that people are scared of storage networking - they spend their time fire-fighting, while all the vendors do is push hardware at them." ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.