Feeds

Server upgrade and disposal plans

Data protection 1, reuse strategy nil?

  • alert
  • submit to reddit

SANS - Survey on application security programs

Poll Results This week we asked you a number of questions around whether you have any immediate plans to change your server estates, who influences any such changes and how you dispose of your old kit. Your answers reveal a wide range of options are under consideration.

Most popular response to the question “what are you planning to do with your server estate in the next twelve months” was that nearly half of you say that some old kit will be retired and replaced with new systems as part of an ongoing, rolling programme. In the current turbulent economic climate this is the ‘business as usual’ reply – we’ll be drilling into this in more detail in our (imminent) server report.

Two of the next three responses show just how far virtualisation has become a mainstream deployment option, whereby virtualisation tools are being used to either increase utilisation rates within the existing server infrastructure, or indeed reduce the overall size of the server estate. Meanwhile the third option, “acquire new servers as required to keep up with demands for new services”, is another indication that IT life and kit acquisition is carrying on even with pressures on budgets – but only a few organisations are planning any major refresh activities right now. The answer of “Haven’t got a clue what will happen next” is honest and does highlight that there remains a degree of volatility in the Reg audience. Amongst the “Other” answers furnished, a number of organisations mentioned looking to either offsite hosting of virtual systems, or large scale outsourcing of server services, with one taking the pragmatic approach of looking to “Intelligently outsource services that fall outside of our core competencies (i.e. email, plain web hosting).”

So, who’s involved in the decision? The Head of IT/CIO role remains the major player with the CEO/MD, CFO/Finance Directors, or indeed other business roles featuring in many fewer decisions – can we put to bed once and for all, the idea that IT spending is a business decision these days?

Some of the most interesting findings this week concerned what you do with old kit. The most favoured approach is to reuse them internally, an approach adopted by around one in three organisations. A not-insignificant proportion (20%) said it depended on circumstances, and other than internal reuse, only 10% of organisations indicated any kind of strategy for dealing with old servers.

While this demonstrates that dealing with old kit still tends to be an afterthought in many organisations, dealing with the data most certainly is not, as we can see from the final chart. The approach of ‘shredding’ server content has been adopted by over 60 percent of respondents, and the removal of data, applications and operating systems are also common steps to take.

Most importantly, fewer than ten percent have adopted the approach of doing nothing and leaving the problem for someone else to deal with. Amongst “other” options taken, the removal and destruction of hard disks was the most frequently mentioned comment.

So, no cigar perhaps on thinking strategically about disposal. But at least the lessons about data loss reported so heavily in the media over the past few years, appear to have been learned.

Combat fraud and increase customer satisfaction

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.