Thanks to all, you have given me some good arguments.

-----Original Message-----
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu]on Behalf Of
Richard Sims
Sent: Friday, September 18, 2009 1:43 PM
To: ADSM-L@VM.MARIST.EDU
Subject: Re: [ADSM-L] TSM architecture


We technicians tend to think about this issue in terms of processing
capacity.  Others in the organization may consider it in different
terms, and indeed perhaps should be reviewed on that larger scale.

If I were a technology-savvy expert in your Security Department and
was made aware of this question of placement, I would immediately
think that the corporation's data gravitates toward this central data
preservation point, and that the application software or the
administrators who log on to that system to manage their application
could bend toward the dark side to gain control of one or more tape
drives to gain surreptitious access to the data, in a physical manner
or - even more conveniently - if there were a TSM client running co-
resident with the TSM server, simply recall it.

This is a traditionally compelling reason for isolating servers
performing distinctly different tasks.  One wonders how aware your new
architect is of more global considerations.

    Richard Sims

Reply via email to