Home
From Wikibon
Line 2: | Line 2: | ||
'''''<u>Peer Incite</u>: Grant, a Sr. Storage Admin at a large bank discusses how heterogeneous storage virtualization can help reduce the budget for 2009.''''' | '''''<u>Peer Incite</u>: Grant, a Sr. Storage Admin at a large bank discusses how heterogeneous storage virtualization can help reduce the budget for 2009.''''' | ||
- | {{Click||image=Icon_listen.gif|link= Media: | + | {{Click||image=Icon_listen.gif|link= Media:11-18-08_Peer_Incite_mashup.mp3 | width=67px|height=16px}} |
*[[2009 Storage budget cuts - what are your options?|Read the Peer Incite Newsletter]] | *[[2009 Storage budget cuts - what are your options?|Read the Peer Incite Newsletter]] | ||
Line 42: | Line 42: | ||
- | [[Category:Blade computing]]<br />[[Category: Business compliance]]<br />[[Category: Clustered storage]]<br />[[Category: DMX]]<br />[[Category: Disaster recovery]]<br />[[Category: EMC]]<br />[[Category: Email archiving]]<br />[[Category: Email storage]]<br />[[Category: Green storage]]<br />[[Category: Hitachi]]<br />[[Category: IBM]]<br />[[Category: Managing storage]]<br />[[Category: Mobile Enterprise Wikitips]]<br />[[Category: SSD]]<br />[[Category: STEC inc]]<br />[[Category: Storage consolidation]]<br />[[Category: Storage disaster recovery]]<br />[[Category: Storage services]]<br />[[Category: Storage vendor management]]<br />[[Category: WEB2.0]]<br />[[Category: Wikitips]]<br /> | + | |
+ | [[Category:Blade computing]]<br />[[Category: Business compliance]]<br />[[Category: Clustered storage]]<br />[[Category: DMX]]<br />[[Category: Disaster recovery]]<br />[[Category: EMC]]<br />[[Category: Email archiving]]<br />[[Category: Email storage]]<br />[[Category: Green storage]]<br />[[Category: Hitachi]]<br />[[Category: IBM]]<br />[[Category: Managing storage]]<br />[[Category: Mobile Enterprise Wikitips]]<br />[[Category: NAND]]<br />[[Category: SSD]]<br />[[Category: STEC inc]]<br />[[Category: Storage consolidation]]<br />[[Category: Storage disaster recovery]]<br />[[Category: Storage services]]<br />[[Category: Storage vendor management]]<br />[[Category: WEB2.0]]<br />[[Category: Wikitips]]<br /> |
Revision as of 21:46, 25 November 2008
Peer Incite: Grant, a Sr. Storage Admin at a large bank discusses how heterogeneous storage virtualization can help reduce the budget for 2009.
WikitipDiligence and securityIs your organization taking every reasonable step to provide technology security? Of course, there is no such thing as a perfectly secure network, but one of the best ways to satisfy the duty of reasonable protection of a network, beyond compliance, is the exercising of a number of fundamental security principles. Foremost of these principles is diligence. One key advantage to exercising heightened diligence is that the organization can use these initiatives to establish a better stance on security altogether. They are also able to respond to legal scenarios by demonstrating that it made good-faith efforts to provide security. Diligence can cover a wide spectrum of focus, but to generalize, staying aware of security and technology developments in the following areas will help an organization's security posture:
For example, typically protecting sensitive information, such as PCI-DSS data, requires agreements with vendors. These agreements are created to ensure security requirements. It is critical to isolate information security directives across physical, monitoring, and computing technology domains, with specificity for your organization’s needs. Minimizing risk is the bottom line, and no detail can be too small. If you have questions, ask. Review the practices your vendors use to support products on your network, and practices that you require of your partners. If you require a vendor to operate in an insecure mode, you may be liable for breaches of its security that can be tied to your requirements. Minimizing risk to the enterprise is the duty of a responsible and secure organization. This goes beyond typical reactive responses to breach events. It actually delves much further into the health of the organization, minimizing risk, and public perception.
|
Featured Case StudyVirtualization Energizes Cal State UniversityJohn Charles is the CIO of California State University, East Bay (CSUEB) and Rich Avila is Director, Server & Network Operations. In late 2007 they were both looking down the barrel of a gun. The total amount of power being used in the data center was 67KVA. The maximum power from the current plant was 75kVA. PG&E had informed them that no more power could be delivered. They would be out of power in less than six months. A new data center was planned, but would not be available for two years. |
|
Featured How-To Note |
Storage Virtualization Design and DeploymentA main impediment to storage virtualization is the lack of multiple storage vendor (heterogeneous) support within available virtualization technologies. This inhibits deployment across a data center. The only practical approach is either to implement a single vendor solution across the whole of the data center (practical only for small and some medium size data centers) or to implement virtualization in one or more of the largest storage pools within a data center. |