Intelligent storage solutions

1 March 2019 Infrastructure

Data protection is becoming a priority, as governments roll out new data security regulations with eye-watering penalties for non-compliance, some of them up to 4% of annual turnover. These regulations, including South Africa’s Protection of Personal Information (POPI) Act and the European Union (EU) General Data Protection Regulation (GDPR), state the need for end-to-end encryption of data. However, it’s not easy to implement and is causing havoc in terms of storage strategies.

Hayden Sadler
Hayden Sadler

This requirement for end-to-end encryption is certainly bringing the benefits of a new generation of intelligent software-defined enterprise storage solutions into sharper focus.

The challenges that these regulations present is exacerbated by digital transformation. To be responsive and competitive, businesses need to digitise and analyse large volumes of data. The correct storage strategies must be in place to cater to the ever-increasing growth of data whilst ensuring their data is secure.

Core to these strategies are three important considerations: performance, availability and cost. At present, companies’ typically use all flash arrays (AFAs) for their high performance and traditional hard disk drives (HDD) for lower costs. However, they end up sacrificing either performance, availability or cost as a result, depending on their choice.

The need for speed

At the top end, for tier 1 storage, performance is paramount to businesses as they require high speed access to business applications and data that impact the operations and customer service. As such, companies look towards high speed flash media, that is typically costly, in order to provide the performance digitally driven companies need. However, it’s not suitable for all enterprise data and can rapidly erode shrinking IT budgets. This has led to technology developments in the storage industry that sees commodity hardware, together with intelligent software, delivering performance at a remarkably low cost.

At the other end of the spectrum, for tier 2 storage, companies use traditional HDD. These spinning disks are considerably less expensive per unit of addressable capacity. The catch is performance - they are slower than flash media.

Both of these approaches are further losing their sheen due to the impact of end-to-end data encryption.

Undoing compression technologies

To clarify, breaches occur within different layers within the IT stack. Therefore, end-to-end encryption makes sense and even if data is stolen, it cannot be used. However, it also has repercussions in terms of storage.

For example, AFAs use deduplication and data pattern recognition to compress data. Encryption randomises data, eliminating those patterns. The result is that AFA’s can only store encrypted data at a 1:1 data compression ratio. At approximately 10 times the cost of spinning media, AFA’s become much less viable, particularly when storing huge volumes of data.

What is proving more sustainable — and delivering performance, capacity and cost sustainably — is artificial intelligence (AI) and machine learning-driven flash-optimised and traditional disk arrays.

The secret sauce is neural cache technology that makes extensive use of Dynamic Random-Access Memory (DRAM), flash media and spinning disks. AFA deliver millisecond responses, while DRAM has nano-second ratings. These learning algorithms driving these intelligent arrays are able to predict data use with greater accuracy, bringing over 80% of all reads and 100% of all writes from DRAM with the remainder mostly from flash media and storing the cold data on spinning disk. This is storage that scales, learns and evolves.

Businesses can breathe a sigh of relief as fortunately, a combination of flash and traditional disk arrays coupled with intelligent software, remove the stress associated with compliance and its impact on storage. Importantly, this approach enables companies to achieve performance, capacity and cost without compromise.

For more information contact Infinidat, scapoor@infinidat.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.