Feeds

Poor change control hits SAN expansion plans

Storage management is hard to teach - Sagitta

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Robust change control and security will be the two biggest headaches for SAN users as they try to integrate and expand their storage network infrastructures, says Andy Norman, founder and CEO of UK storage specialist Sagitta.

"Most of the problems we've seen have been consequences of poor planning and change control," he says. "Not poor planning on paper necessarily, but in not understanding the technical implications of change."

He gave the example of a company which took offline half of an array used for data replication. Traffic into the other half climbed as a result and the whole thing failed.

"It's that high level infrastructure understanding and it can't be exhaustively taught," he says. "Storage managers learn the basics, but the high level stuff comes from having been there and done that kind of thing a lot already."

He adds that, as storage networks grow in complexity, users may try to circumvent the shortage of storage management skills by bringing in external help, but that this brings risks of its own: "There are general security issues here - people could break in unless you think of all the blocks that need to be in place."

Norman was speaking as Sagitta added an ongoing SAN support service to its existing plan, design and implement services. This eXpert Support Service includes capacity planning, auditing, configuration and change management, and 24x7 remote monitoring.

One of the first customers for the new service is West Yorkshire Police, which has hired Sagitta to manage the storage behind its new Linux-based video identity parade system.

A key part of eXpert Support Service is Sagitta's own WatchDog software, which monitors the whole storage infrastructure. Norman says this is specifically designed to support the service and simplify administration, not to enhance or sell SAN hardware.

"We position it carefully," he says. "It's not management, and you don't lose control. A server in the customer site collects and filters data and the customer can view it too - a lot of them make use of that. Also, we do it in a way that's culturally-secure."

He says that Sagitta is open to transferring skills to the customer, or letting the customer outsource certain skills: "It ties back to a research project we did last year, which said that people are scared of storage networking - they spend their time fire-fighting, while all the vendors do is push hardware at them." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.