ebook img

Data Lifecycles: Managing Data for Strategic Advantage PDF

271 Pages·2007·4.24 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Data Lifecycles: Managing Data for Strategic Advantage

Data Lifecycles Managing Data for Strategic Advantage Roger Reid Symantec Corporation, USA Gareth Fraser-King Symantec Corporation, UK W. David Schwaderer Symantec Corporation, USA Data Lifecycles Data Lifecycles Managing Data for Strategic Advantage Roger Reid Symantec Corporation, USA Gareth Fraser-King Symantec Corporation, UK W. David Schwaderer Symantec Corporation, USA ©2007VERITASSoftwareCorporation.Allrightsreserved.VERITASandallotherVERITASproduct namesaretrademarksorregisteredtrademarksofVERITASSoftwareCorporationoritsaffiliatesin theU.S.andothercountries.Othernamesmaybetrademarksoftheirrespectiveowners. Email(forordersandcustomerserviceenquiries):[email protected] VisitourHomePageonwww.wiley.com AllRightsReserved.Nopartofthispublicationmaybereproduced,storedinaretrievalsystemor transmittedinanyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningor otherwise,exceptunderthetermsoftheCopyright,DesignsandPatentsAct1988orunderthetermsof alicenceissuedbytheCopyrightLicensingAgencyLtd,90TottenhamCourtRoad,LondonW1T4LP, UK,withoutthepermissioninwritingofthePublisher.RequeststothePublishershouldbeaddressed tothePermissionsDepartment,JohnWiley&SonsLtd,TheAtrium,SouthernGate,Chichester,West SussexPO198SQ,England,[email protected],orfaxedto(+44)1243770620. Thispublicationisdesignedtoprovideaccurateandauthoritativeinformationinregardtothesubject mattercovered.ItissoldontheunderstandingthatthePublisherisnotengagedinrendering professionalservices.Ifprofessionaladviceorotherexpertassistanceisrequired,theservicesofa competentprofessionalshouldbesought. OtherWileyEditorialOffices JohnWiley&SonsInc.,111RiverStreet,Hoboken,NJ07030,USA Jossey-Bass,989MarketStreet,SanFrancisco,CA94103-1741,USA Wiley-VCHVerlagGmbH,Boschstr.12,D-69469Weinheim,Germany JohnWiley&SonsAustraliaLtd,42McDougallStreet,Milton,Queensland4064,Australia JohnWiley&Sons(Asia)PteLtd,2ClementiLoop#02-01,JinXingDistripark,Singapore129809 JohnWiley&SonsCanadaLtd,6045FreemontBlvd,Mississauga,Ontario,CanadaL5R4J3 LibraryofCongressCataloginginPublicationData Reid,Roger(RogerS.) Datalifecycles:managingdataforstrategicadvantage/RogerReid,GarethFraser-King, andW.DavidSchwaderer. p. cm. Includesbibliographicalreferencesandindex. ISBN-13:978-0-470-01633-6(cloth:alk.paper) ISBN-10:0-470-01633-7(cloth:alk.paper) 1. Databasemanagement. 2. Productlifecycle. 3. Informationretrieval. 4. Informationstorageandretrievalsystems—Management. I. Fraser-King,Gareth. II. Schawaderer,W.David,1947– III. Title. QA76.9.D3R427482007 005.74—dc22 2006032093 BritishLibraryCataloguinginPublicationData AcataloguerecordforthisbookisavailablefromtheBritishLibrary ISBN-10:0-470-01633-7 ISBN-13:978-0-470-01633-6 Typesetin11/13ptPalatinobyIntegraSoftwareServicesPvt.Ltd,Pondicherry,India PrintedandboundinGreatBritainbyAntonyRoweLtd,Chippenham,Wiltshire Thisbookisprintedonacid-freepaperresponsiblymanufacturedfromsustainableforestryinwhichat leasttwotreesareplantedforeachoneusedforpaperproduction. Contents Preface ix Whoshouldreadthisbook ix Purposeofthisbook x 1 IntroducingUtilityComputing 1 1.1 Realproblemsandrealsolutions 5 1.1.1 Realissuesidentified–regulation,legislationandthelaw 5 1.1.2 Moreregulation,legislationandthelaw 6 1.1.3 Currentstoragegrowth 8 1.2 Newstoragemanagement 9 1.2.1 Whatarethethingsorganisationsneedtoconsider? 11 1.2.2 Whatdoesdatalifecyclemanagementmean? 13 1.2.3 WhyisITlifecyclemanagementimportant? 15 1.2.4 Goalsofdatalifecyclemanagement 16 2 TheChangingITImperative 19 2.1 Introductiontoutilitycomputing 22 2.2 Generalmarkethighlights 25 2.2.1 Currentstoragegrowth 26 2.2.2 EnterprisesforwhichDLMiscritical 30 2.3 Realchallengesandopportunities 36 2.3.1 Realissuesidentified 36 2.3.2 Datacompliance 37 2.3.3 Casestudyinineffectivestoragereporting 39 2.4 Summary 40 3 BeingCompliant 43 3.1 Sowhataretheregulations? 46 3.2 Financialservicescompanies 49 3.2.1 Crimeinthefinancesector 52 DataLifecycles:ManagingDataforStrategicAdvantage RogerReid,GarethFraser-Kingand W.DavidSchwaderer ©2007VERITASSoftwareCorporation.Allrightsreserved. vi CONTENTS 3.3 Telecommunicationscompanies 54 3.4 Utilitiescompanies 58 3.5 Publicauthoritiesandgovernment 59 3.6 Managingdataforcomplianceisjustaspecialisedformof datamanagement 61 3.7 Justplainjunkdata! 63 3.8 Thebottomline–whatismandated? 64 3.8.1 Recordretentionandretrieval 65 3.8.2 Auditableprocess 68 3.8.3 Reportinginrealtime 69 3.8.4 Integrating data management from desktop to data centretooffsitevault 72 3.8.5 Challenge–thedatadilemma 72 4 DataTaxonomy 75 4.1 Anewdatamanagementconsciousnesslevel 77 4.1.1 De-mystifyingdataclassification 79 4.1.2 Definingdataclassification 81 4.1.3 Classificationobjectives 81 4.1.4 Variousapproachestodataclassification 82 4.2 Datapersonification 83 4.2.1 Businessinfrastructuremappinganalysis 84 4.3 Classificationmodelandframework 87 4.4 Customerreporting 97 4.4.1 Summaryreports 98 4.4.2 Detailedreports 100 4.4.3 Summarygraphs 104 4.5 Summary 105 5 EmailRetention 107 5.1 Emailmanagementtoachievecompliance 108 5.2 Whatisarchiving? 109 5.2.1 Emailarchivingrequirements 110 5.3 Howshouldorganisationsmanagetheiremailrecords? 111 5.4 Emailretentionpoliciesareforlife–notjustforChristmas 113 5.5 Howcompaniescangaincompetitiveadvantageusingcompliance 114 5.5.1 Compliancemakesgoodbusinesssense 115 5.6 Whatlawsgovernemailretention? 117 5.6.1 Howlongdowehavetokeepemailrecords? 118 5.7 Writeonce,secureagainsttampering 119 5.8 Storagerecommendationsforemail 121 5.9 Conclusion 124 6 Security 125 6.1 Alertingorganisationstothreats 125 6.1.1 Vulnerabilityidentifiedandearlywarnings 129 6.1.2 Earlyawarenessofvulnerabilitiesandthreatsinthewild 130 6.1.3 Listeningposts 132 CONTENTS vii 6.2 ProtectingdataandITsystems 133 6.2.1 Threatsblockedusingvulnerabilitysignaturestoprevent propagation 134 6.2.2 Preventinganddetectingattacks 135 6.2.3 Managingsecurityinadatacentre 136 6.2.4 Monitoring and identification of systems versus vulnerabilitiesandpolicies 137 6.2.5 Responding to threats and replicating across the infrastructure 138 6.2.6 Patchesandupdatesimplementedacrossinfrastructure 139 6.2.7 Keepinginformationsecureandavailable 140 6.3 Conclusions 140 Reference 143 7 DataLifecyclesandTieredStorageArchitectures 145 7.1 Tieredstoragedefined 145 7.1.1 SerialATAbackground 147 7.1.2 SerialATAoverview 148 7.1.3 SerialATAreliability 150 7.1.4 Biterrorrate(BER) 151 7.1.5 Meantimebeforefailure(MTBF) 152 7.1.6 Failureratebreakdown 154 7.1.7 Nofreelunch 155 7.2 RAIDreview 156 7.2.1 RAID5review 156 7.2.2 RAID6overview 158 7.3 Tape-basedsolutions 159 7.3.1 Virtualtapelibraryprimer 160 7.4 Recoverabilityofdata:yougetwhatyoupayfor 163 7.5 Conclusion 166 Bibliography 167 8 ContinuousDataProtection(CDP) 169 8.1 Introduction 169 8.2 CDPdata-taps 171 8.2.1 Applicationdata-tap 172 8.2.2 Filesystemdata-tap 172 8.2.3 Volumedata-tap 172 8.3 CDPoperations 175 8.3.1 CDPstore 177 8.3.2 CDPstakeholders 180 8.4 Conclusion 182 9 WhatistheCostofanITOutage? 185 9.1 Failureisnotanoption 185 9.1.1 Tangiblecosts 187 9.1.2 Intangiblecosts 189 9.2 FindingtheelusiveROI 191

Description:
Businesses now rely almost entirely on applications and databases, causing data and storage needs to increase at astounding rates. It is therefore imperative for a company to optimize and simplify the complexity of managing its data resources. Plenty of storage products are now available, however th
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.