Storage Virtualization merges various physical storage devices in a datacenter and creates an artificial view of the storage environment. Typically, clients and servers do not come to know where the files they are using actually reside. They will also not be aware of the type of storage media that holds their data. This could be hard disks or solid state technology such as DRAM.
Storage Virtualization technology was first developed in the mainframe era and has continued in some form on microcomputers and on x86 systems. With the arrival of network based storage and a move away from client / server based storage, interest in the technology has been triggered afresh.
Storage in the storage virtualization pool can take many forms. These could be storage area networks (SAN), direct attached storage (DAS), network attached storage (NAS) and so on.
Advantages of Storage Virtualization
A key advantage comes from the concept of the assignation of a logical unit (LUN) of storage of a given size. If you have created a LUN of, say, 100 GB, and you are presently using only 20 GB of this, then the file associated with your storage will only be 20 GB. As the volume of your data increases, the disk will expand dynamically till it reaches the limit that you have defined. Only then will it request additional allocation. This permits provisioning based on actual use and not on estimates which is a big improvement on how disk storage was traditionally purchased.
An additional advantage is that if you are using 20 GB out of your disk space of 100 GB, then only 20 GB is shown against your account. This pay as you go model can result in substantial savings. However the above two are not the only benefit of Storage Virtualization. Other substantial benefits also exist. These are briefly discussed below –
Using Storage VirtualizationUsing Storage Virtualization
Storage Virtualization is for you if your organization is looking for any of these benefits –
The Importance of Back Up
The need for reliable backup can seldom be overstated, but with storage virtualization this becomes even more critical. If you have created logical units (LUNs) of storage for your users but have not built in a proper backup plan then you are introducing a single point of failure. Backup therefore is to be planned for when you begin thinking about your storage virtualization solution and not when you have already rolled it out. Data protection is a critical aspect of storage management in a datacenter. No responsible system administrator will be willing to be faulted on this.
To conclude, storage virtualization is not a new concept, it has been around for a long time. The very fact that it has lasted from the days of the early mainframe indicates that it is a robust concept that has much to offer. With the emergence of large datacenters, we now have the capability to take this concept far beyond what was originally imagined.
In this report from Securosis, learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks. more
To help you understand how to minimize vulnerabilities in web applications, Qualys provides this guide as a primer to web application security. The guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution. more
With the growth of the Internet and the increasing reliance on web and mobile applications, it’s no surprise that data breaches associated with applications are also increasing. So how does your organization address application security today? more
If you’re a small business, we salute you. Small enterprises are the engine of our economy, generating innovation, employment and wealth, so your security matters. This guide shows how you can reduce your risks at an affordable price. more
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter‐measures easily justified by its ability to optimize risk. more