Survey: Data Archival Efforts Inefficient
New report cites weak archival strategies and high risk for data.
Yes, companies are busy archiving growing data piles. But then again a majority are using poor techniques and management strategies and that's putting valuable corporate information at risk.
In its 2007 Database Archiving Survey unveiled this week, the Enterprise Strategy Group (ESG) predicted primary production databases will grow 25 percent each year through 2012. The research firm predicts archived data will exceed more than 30 pedabytes of database information in the same time frame.
Looking out further, ESG expects total worldwide database archive capacity to jump from last year's 1,198 petabytes to 13,639 petabytes by 2012 -- a 63 percent growth rate.
All of which means data archiving and retrieval will be even more critical in the future, ESG reported. Currently, 63 percent of archive database records do not meet government and industry regulations, the survey stated.
A 2005 ESG survey on database archiving wasn't so gloomy. While archival processes weren't terrific, organizations had a better grip on data piles, Brian Babineau, ESG senior analyst, told InternetNews.com. One reason is that the primary data at the time was e-mail.
"It [data archiving] was still manageable, and there were things companies could plug in to help," he added. "Today it's all about databases, and it's time that the application owners and the database admins get together to determine good archive and storage strategies."
The increased costs and risks associated with poor protection and retention will continue to increase if companies don't adopt more efficient strategies, Babineau said.
The first step [for IT] is to examine the factors around the data and the IT impediments. Do they have to meet privacy rules? Are they pulling data every day for e-discovery mandates? If yes they need to find one good solution," he explained.
March 18, 2008
A security experts hope the industry can keep that momentum going and start really paying attention to the security of our software, and not just try to retro-engineer security through largely superficial bolt-on products.