Should I use data deduplication to manage unstructured data?

Absolutely; there are two areas where data deduplication, or single-instance storage, can help...

Absolutely; there are two areas where data deduplication, or single-instance storage, can help. Deduplication is fairly common today in backups using a variety of appliances or software. Since this is backup, however, it doesn't address the immediate problem of unstructured data growth at the source. There are deduplication products that can help at the source, but they're not as popular today because the added workload in identifying similar blocks or byte sequences, or files, depending on the level of deduplication you choose. From a source or production storage perspective, deduplication may impact performance, making the technology less appealing. This is why we see a lot of deduplication deployed at the backup level. See the article Data Deduplication Explained for more information.

@34164 Still, specific products, like email archiving tools, can help reduce the amount of data being stored, keeping just what you need from a policy perspective. The deduplication element of this approach allows you to shrink storage requirements. Deduplication is also appearing at the WAN level to reduce data volumes transferred between locations -- particularly when replicating data. Deduplication certainly isn't limited to unstructured data, but that's where deduplication can really shine.

Listen to the Unstructured data FAQ audiocast.

Go to the beginning of the Unstructured Data FAQ Guide.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Business applications

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close