logo
How Modern Archiving Helps Enterprises Contain The Data Explosion

How Modern Archiving Helps Enterprises Contain The Data Explosion

Forbes25-06-2025
Carl D'Halluin, Chief Technology Officer at Datadobi.
As data creation and retention rates continue to increase, the time frame for active data use has shrunk, with most files accessed less frequently and for shorter periods before becoming dormant. This growing imbalance means managing ever-larger volumes of inactive data on high-cost primary storage, driving up infrastructure spend without delivering equivalent business value.
It's a persistent challenge, with data expanding to fill available storage almost as quickly as capacity is added. It drives near-relentless system expansion in a largely futile effort to keep up. In response, archiving has become a more critical part of enterprise strategies, particularly in the struggle to retain vast volumes of unstructured data. Think of it as a technology coping strategy where leaders prioritize short-term relief without addressing the underlying problem.
For many, archiving has also become synonymous with tiering solutions. This means keeping frequently accessed data on high-performance systems and relocating colder data to lower-cost tiers. While this can appear similar to archiving, in that data is moved off primary storage to another system, a key difference is that tiering leaves behind an artifact, such as a stub or link, which is later used to access the relocated content.
Tiering has its challenges. For instance, tiering solutions insert themselves into the data path and control how archived files are accessed. As a result, cold data can only be recalled by going through the tiering system itself. If that system goes offline or is removed, access to the data is lost, regardless of whether the files still exist. This can lock organizations into fragile tiering ecosystems that don't scale well, resulting in a messy combination of hidden costs, operational drag and long-term technical debt.
The Move To Modern Archiving
Modern archiving technologies can offer a more strategic route. The emphasis on "modern" reveals a very important distinction, given the widespread confusion that exists between the act of archiving and the archive platform itself. In reality, archiving is the process of identifying and relocating specific data, whereas the storage platform is simply the destination. Yet many vendors blur the lines, positioning their storage systems as complete archiving solutions, whereas they're only where the data ends up.
True archiving starts with identifying what should be moved. That could mean targeting files that haven't been accessed or modified for a certain period or isolating data that an inactive user ID owns, perhaps tied to a departed employee. Finding that data, buried among billions of files across multiple systems, is typically far from straightforward. Without the right tools, it's a time-consuming and impractical task.
Modern archiving relocates inactive files to lower-cost storage platforms, reducing primary storage capacity requirements and delaying expensive system expansions. This approach reduces ongoing expenses and frees up high-performance infrastructure for critical workloads.
Our customer research shows that in a typical real-world 10-petabyte enterprise storage environment, primary storage costs around $1,100 per terabyte annually, including hardware, software, power and staffing. Assuming 6.5 petabytes of that data was inactive and low-touch (a number that's not uncommon to see in large enterprises), an organization in this situation could be spending roughly $7.15 million per year to retain it.
Archiving that same 6.5 petabytes to a combination of active and deep archive tiers, such as those available through AWS, lowers the ongoing cost to just under $15,000 per month, an overall reduction of 97%—a remarkable saving that should be within the grasp of IT teams everywhere.
Barriers To Adoption
Despite the clear advantages, the widespread adoption of modern archiving solutions has been slow.
One key reason is the complexity of today's IT environments. Organizations deploy solutions from multiple vendors across hybrid cloud models, making interoperability a challenge. Historically, companies have lacked the technology to efficiently archive data at a massive scale across heterogeneous environments. As a result, many have relied on backup and recovery systems as a makeshift archive even though these solutions aren't designed for long-term data retention.
Another significant barrier is vendor lock-in. Many traditional archiving solutions store data in proprietary formats either to optimize storage efficiency or for other purposes, creating long-term dependencies on specific vendors. This makes it difficult for organizations to retrieve archived data outside of the original system. A truly modern archiving solution must maintain data in its original format, ensuring accessibility regardless of changes to platform or vendor.
Organizational buy-in also plays a crucial role in adoption. Until recently, many companies lacked formal retention policies, leaving IT teams without clear directives for an archiving strategy. Governance, risk and compliance teams are beginning to define organizationwide policies, but in their absence, data accumulates unchecked. This leads to increased costs and security risks associated with aging data.
The tech industry must support these efforts by offering solutions that integrate seamlessly with existing infrastructures, ensuring compliance while simplifying data management. By addressing these concerns, modern archiving solutions can transition from niche tools to essential components of digital infrastructure.
Orchestrate To Accumulate
Operationally, archiving can also help avoid performance degradation as storage systems inevitably fill up, resulting in faster backups and reduced replication loads. From a sustainability perspective, moving cold data off energy-intensive storage platforms can significantly reduce carbon emissions, resulting in a smaller overall technology footprint.
Success also depends on metadata insight. Files untouched for three-plus years often account for over 60% of stored data, representing a major opportunity at scale. Conceptually, this may seem trivial, but access to this kind of information is essential, particularly when an organization is using multiple storage systems and cloud services (probably from different vendors), storing billions or even tens of billions of files.
Get this approach right, and the result is a far more manageable environment with the ability to continue to identify and relocate data as it ages and crosses archiving policy thresholds. When delivered as part of a broader data orchestration strategy, where data is automatically managed and coordinated across diverse storage systems, modern archiving enables ongoing accessibility throughout the data life cycle without the cost and complexity inherent in legacy approaches.
Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Target Sued In Two Class Actions Over Gift Card Scams
Target Sued In Two Class Actions Over Gift Card Scams

Forbes

timea few seconds ago

  • Forbes

Target Sued In Two Class Actions Over Gift Card Scams

Scammers are big fans of gift cards because they are easy to purchase, easy to send to the scammer and impossible to trace. It is not even necessary for the scammer to be in possession of the actual gift card to use it. Sending the gift card numbers or taking a picture on your phone and transmitting it to the scammer is sufficient for the scammer to use the gift card to buy things that can then be sold and converted into cash. In many instances scammers pose as large companies or government agencies such as the IRS demanding payments. This is called an "imposter scam.' According to the FTC, in 2024 Americans lost $2.95 to imposter scams, second only to investment fraud. In 2021 the FTC noted that Target gift cards were the most popular choice for scammers with scammers asking specifically for Target gift cards in twice as many instances as the next most popular gift card and even when the gift card requested by the scammers was not a Target gift card, the scammers asked their victims to purchase the particular gift cards at a Target store. More recent data of the FTC indicates that Target gift cards were the second most popular gift card of scammers with Apple gift cards being most used by scammers. Recently four victims of the imposter scam sued Target seeking class action status alleging that Target failed to use its own security algorithms and real-time tracking software to prevent these scams. The plaintiffs further allege that Target benefited financially from gift card scams. Responding to the lawsuit a Target spokesperson said 'While we cannot comment on pending litigation, we take significant steps to combat this type of criminal activity and protect consumers.' One of the plaintiffs, Robert Reese received an email from a scammer posing as an Amazon customer service representative who convinced him he needed to send Amazon $10,800 in gift cards, instructing him to get $6,000 of that amount from Target through the purchase of twelve $500 gift cards. HOW TO AVOID GIFT CARD SCAMS Fortunately, scams requiring payment through gift cards are easy to avoid. Anytime anyone approaches you with a business transaction in which you are asked to pay through gift cards, you can be confident that it is a scam. The IRS even posts on its website that it does not accept gift cards as payments. An important thing to remember is that gift cards are gifts, they are not used as a payment method for any legitimate transaction so if you are asked to pay for any business transaction through a gift card, you can be sure it is a scam. Target has also been sued in a class action regarding gift card scams by customers from 21 states who bought Apple gift cards at Target that had been tampered with by scammers that resulted in the scammers emptying the gift cards of their value. The plaintiffs allege that Target is aware of this problem and has not done enough to stop it. This type of scam is called gift card draining. The most common way gift card draining occurs involves scammers going to racks of gift cards in stores and, using handheld scanners, read the code on the strip of the card and the number on the front. They then put the card back in the display and periodically check with the retailer by calling its 800 number to find out whether the card has been activated and what the balance is on the card. Once they have this information, they either create a counterfeit card using the information they have stolen or order merchandise online without having the actual card in hand. Another common way gift card draining occurs is when scammers place a sticker with the barcode of a gift card that the scammers possess over the actual barcode of the gift card in the rack. Thus, when the card is taken by the gift card purchaser to the checkout counter to have the card activated, the funds used to purchase the gift card are credited to the card of the scammer. It is not until the gift card purchaser tries to use his or her card that it is discovered that there are no funds credited to the card. Some retailers, to reduce gift card fraud put a PIN on the gift card so that if the card is used online, the user must have access to the PIN which is generally covered and must have the covering material scratched off in order to be visible. Unfortunately, many purchasers of gift cards are not aware of this, so they don't even notice that the PIN on the card that they are purchasing has already had covering material scratched off by the scammer who has recorded the PIN. HOW TO AVOID GIFT CARD DRAINING As with so many scams, the best place to look for a helping hand is at the end of your own arm. Always inspect the card carefully to make sure that the barcode has not been tampered with in any fashion and that the PIN is still covered and when buying a gift card, only purchase cards from behind the customer service desk. If the card is preloaded, always ask for the card to be scanned to show that it is still fully valued.

If You Get This Voicemail, Your Google Account Is Under Attack
If You Get This Voicemail, Your Google Account Is Under Attack

Forbes

timea few seconds ago

  • Forbes

If You Get This Voicemail, Your Google Account Is Under Attack

Google has confirmed that user accounts are under attack. And while the spiraling threat from infostealers is now out of control, almost 40% of 'successful intrusions' come from phishing attacks that steal user names and passwords. While Gmail accounts are prized above all, once a hacker has control of your Google account credentials they can access all the Google services you use, as well as any other third-party apps and services that rely on your Google credentials to sign-in. Old school phishing attacks using poorly written messages and emails are being replaced by nicely written, grammatically correct lures courtesy of AI. And when you click a link through to a fake login page, it's now a perfect replica of the real thing. Attacks even include hijacks of Google's own suspicious sign-in warnings and its 'no-reply' email addresses, plus the exploitation of legitimate infrastructure such as Forms, Sites and even Translate. If it's out there, one bad actor or another will try to use it. Courtesy of Redditor anuraggawande, there's even a malicious voicemail doing the rounds — or at least a voicemail notification. 'I received an email claiming I had a 'New Voicemail Notification'. The email included a big 'Listen to Voicemail' button.' The link 'used a legitimate Microsoft Dynamics domain to host the initial page, instantly boosting credibility.' But 'after solving the captcha, the site redirected to a Gmail login clone hosted on the same malicious domain and not to The page was pixel-perfect, ready to steal credentials.' Typically now, this attack looked 'looked professional and harmless, but just as with any message, email or notification from Google or any other provider, you should never log into any website or platform from a link. Always use your regular methods of entry to access your accounts — apps or websites. The other critical advice is to use a non-SMS form of two-factor authentication and to add a passkey. As Google explains, 'passkeys offer users a convenient and secure authentication experience across websites and apps. Unlike passwords, which can be guessed, stolen, or forgotten, passkeys are unique digital credentials tied to a user's device.'

Meet The Founder Who Proves Making Mistakes Can Make You Millions
Meet The Founder Who Proves Making Mistakes Can Make You Millions

Forbes

timea few seconds ago

  • Forbes

Meet The Founder Who Proves Making Mistakes Can Make You Millions

When Kim Perell sold her company for $235 million, the headlines focused on the massive exit. What they didn't capture were the wrong turns, missed opportunities and hard lessons that made that milestone possible. In her newest book, Mistakes That Made Me a Millionaire, Perell reframes failure not as a setback but as a catalyst for resilience, creativity and ultimately wealth. A serial entrepreneur who has founded nine companies and an angel investor with more than 150 startups in her portfolio, Perell knows the road to success is rarely straight. Her journey, told in her three bestselling books, offers an inside look at what it really takes to build and rebuild businesses. The central lesson is that mistakes aren't fatal, they are necessary. The Power of Execution Perell's first book, The Execution Factor, tackles one of entrepreneurship's most common challenge - ideas are everywhere but successful execution is rare. 'Clarity of vision gives you power,' she told me. The challenge lies in turning ideas into action. Her advice is to 'think big but act small.' Dream of seeing your product in every Target across America, for example, but start by selling it to a neighbor. She also emphasizes the importance of finding even a single believer, whether a customer, an investor or a friend. That early validation gives entrepreneurs the confidence to keep going, especially when mistakes feel overwhelming. For Perell, execution is less about perfection than persistence. Progress comes from learning, adapting and continuing despite setbacks. Jumping Into the Unknown Her second book, JUMP: Dare to Do What Scares You in Business and Life, addresses another universal barrier - fear. Success, she argues, doesn't come from staying safe. It comes from being willing to take the leap. 'Your confidence in yourself has to be greater than everyone else's doubt,' she explained. Rejection, she says, is inevitable but it is also instructive. 'Rejections are like mistakes. If it happens enough, you just get numb to it. I just know I have to get to the one yes so, I keep going.' This perspective explains her willingness to invest at the idea stage, often before a company has revenue. She is betting on conviction, tenacity and self-belief, the very qualities that helped her recover after early career setbacks. The Lessons of Mistakes In Perell's most recent book, Mistakes That Made Me a Millionaire, she shares the wrong turns that ultimately fueled her success. Among the most common mistakes she highlights are: One of her hardest lessons came from trying to shoulder everything alone. In her first company she adopted what she calls a 'lone wolf' mentality. The result was burnout. 'No matter how great you are, if you don't have a team and you don't have the 'four people pillars', like a house, you can't stand.' Those four pillars form a framework every founder can use: Without that scaffolding, she says, even the most determined entrepreneur will struggle. Reframing Mistakes as Strategy Perhaps the boldest message of her new book is that mistakes deserve a makeover. From childhood we are taught to avoid them at all costs. Perell insists they are not evidence of weakness but proof of progress. 'Success isn't a straight line,' she said. 'It's the mistakes and the challenges and roadblocks and no's and rejections that make you great.' She points to a defining moment early in her career when she turned down a board opportunity because she felt underqualified. Looking back, she calls it one of her biggest mistakes. Today she takes the opposite approach. 'From now on I'm just going to say yes and figure it out as I go.' By sharing the truth, not just the headline of a nine-figure sale, she reminds readers that every rejection, wrong partnership and missed chance is not the end but a step forward. Advice Every Female Founder Should Hear Perell's advice is especially powerful for women who often feel pressure to be perfectly prepared before taking risks. She recommends women don't wait until they are ready, don't fear rejection and don't go it alone. And, most importantly, don't bury your mistakes. 'Mistakes are essential to being successful,' she said. 'There is a lesson in every mistake. Learn from it and grow from it. Instead of trying to not make them, embrace them. Just don't make the same mistake twice.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store