Skip to main content

Storage as a service (STaaS)


Storage as a service (STaaS) is a managed service in which the provider supplies the customer with access to a data storage platform. The service can be delivered on premises from infrastructure that is dedicated to a single customer, or it can be delivered from the public cloud as a shared service that's purchased by subscription and is billed according to one or more usage metrics.

STaaS customers access individual storage services through standard system interface protocols or application program interfaces (APIs). Typical offerings include bare-metal storage capacity; raw storage volumes; network file systems; storage objects; and storage applications that support file sharing and backup lifecycle management.

Storage as a service was originally seen as a cost-effective way for small and mid-size businesses that lacked the technical personnel and capital budget to implement and maintain their own storage infrastructure. Today, companies of all sizes use storage as a service.

Uses of STaaS

Storage as a service can be used for data transfers and redundant storage, as well as to restore any corrupted or lost data. CIOs may want to use STaaS for the ability to deploy resources at an instant or to replace some existing storage space -- leaving room for on-premises storage hardware. CIOs may also appreciate the ability to tailor storage capacity and performance per workload.

As an example, instead of maintaining a large tape library and arranging to vault (store) tapes off site, a network administrator that uses STaaS for backups could specify what data on the network should be backed up and how often it should be backed up. Their company would sign a service-level agreement (SLA) whereby the STaaS provider agrees to rent storage space on a cost-per-gigabyte-stored and cost-per-data-transfer basis, and the company's data would then be automatically transferred at the specified time over the storage provider's proprietary wide area network (WAN) or the internet. If the company's data were to ever become corrupt or get lost, the network administrator could contact the STaaS provider and request a copy of the data.

Storage as a service in cloud computing

Instead of storing data on-premises, organizations that use STaaS will typically utilize a public cloud for storage and backup needs. Public cloud storage may also use different storage methods for STaaS. These storage methods include backup and restore, disaster recovery, block storage, SSD storage, object storage and bulk data transfer. Backup and restore refers to the backing up of data to the cloud, which provides protection in case of data loss. Disaster recovery may refer to protecting and replicating data from virtual machines (VMs).

Block storage enables customers to provision block storage volumes for lower-latency I/O. SSD storage is another storage type that is typically used for intensive read/write and I/O operations. Object storage systems are used in data analytics, disaster recovery and cloud applications and tend to have high latency. Cold storage is used to create and configure stored data quickly. Bulk data transfers will use disks and other hardware to transfer data.

Advantages of STaaS

Key advantages to STaaS in the enterprise include the following:

  • Storage costs. Personnel, hardware and physical storage space expenses are reduced.
  • Disaster recovery. Having multiple copies of data stored in different locations can better enable disaster recovery measures.
  • Scalability. With most public cloud services, users only pay for the resources that they use.
  • Syncing. Files can be automatically synced across multiple devices.
  • Security. Security can be both an advantage and a disadvantage, as security methods may change per vendor. Data tends to be encrypted during transmission and while at rest.

Disadvantages of STaaS

Common disadvantages of STaaS include the following:

  • Security. Users may end up transferring business-sensitive or mission-critical data to the cloud, which makes it important to choose a service provider that's reliable.
  • Potential storage costs. If bandwidth limitations are exceeded, these could be expensive.
  • Potential downtimes. Vendors may go through periods of downtime where the service is not available, which can be trouble for mission-critical data.
  • Limited customization. Since the cloud infrastructure is owned and managed by the service provider, it is less customizable.
  • Potential for vendor lock-in. It may be difficult to migrate from one service to another.

Popular storage-as-a-service vendors

Examples of STaaS vendors include Dell EMC, Hewlett Packard Enterprise (HPE), NetApp and IBM. Dell EMC provides Isilon NAS storage, EMC Unity hybrid-flash storage and other storage options. HPE has an equally large, if not larger, presence in storage systems compared to Dell EMC.

Other public cloud vendors with cloud storage services include the following:

  • Amazon Web Services (AWS)

  • Microsoft Azure

  • Google Cloud

  • Oracle cloud

  • Box

  • Arcserve

Before choosing a service method, an organization should consider the location of the data centre, its security methods, cost, performance, availability, scalability and potential of vendor lock-in.

Comments

Popular posts from this blog

Understanding the Evolution: AI, ML, Deep Learning, and Gen AI

In the ever-evolving landscape of artificial intelligence (AI) and machine learning (ML), one of the most intriguing advancements is the emergence of General AI (Gen AI). To grasp its significance, it's essential to first distinguish between these interconnected but distinct technologies. AI, ML, and Deep Learning: The Building Blocks Artificial Intelligence refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. Machine Learning, a subset of AI, empowers machines to learn from data and improve over time without explicit programming. Deep Learning, a specialized subset of ML, involves neural networks with many layers (hence "deep"), capable of learning intricate patterns from vast amounts of data. Enter General AI (Gen AI): Unraveling the Next Frontier Unlike traditional AI systems that excel in specific tasks (narrow AI), General AI aims to replicate human cognitive abilities across various domains. I...

Normalization of Database

Database Normalisation is a technique of organizing the data in the database. Normalization is a systematic approach of decomposing tables to eliminate data redundancy and undesirable characteristics like Insertion, Update and Deletion Anamolies. It is a multi-step process that puts data into tabular form by removing duplicated data from the relation tables. Normalization is used for mainly two purpose, Eliminating reduntant(useless) data. Ensuring data dependencies make sense i.e data is logically stored. Problem Without Normalization Without Normalization, it becomes difficult to handle and update the database, without facing data loss. Insertion, Updation and Deletion Anamolies are very frequent if Database is not Normalized. To understand these anomalies let us take an example of  Student  table. S_id S_Name S_Address Subject_opted 401 Adam Noida Bio 402 Alex Panipat Maths 403 Stuart Jammu Maths 404 Adam Noida Physics Updation Anamoly :  To upda...

How to deal with a toxic working environment

Handling a toxic working environment can be challenging, but there are steps you can take to address the situation and improve your experience at work: Recognize the Signs : Identify the specific behaviors or situations that contribute to the toxicity in your workplace. This could include bullying, harassment, micromanagement, negativity, or lack of support from management. Maintain Boundaries : Set boundaries to protect your mental and emotional well-being. This may involve limiting interactions with toxic individuals, avoiding gossip or negative conversations, and prioritizing self-care outside of work. Seek Support : Reach out to trusted colleagues, friends, or family members for support and advice. Sharing your experiences with others can help you feel less isolated and provide perspective on the situation. Document Incidents : Keep a record of any incidents or behaviors that contribute to the toxic environment, including dates, times, and specific details. This documentation may b...