Vulnerabilities / Threats //

Insider Threats

6/12/2012
11:01 AM
50%
50%

Actifio Boosts Storage Efficiency, Capacity

Protection and Availability Storage 5.0 eliminates extra copies of snapshot, backup, disaster recovery, business continuity, and other data.

Data protection specialist Actifio launched Tuesday the next version of its protection and availability software that helps administrators deduplicate, back up, snapshot, and replicate their data and save storage capacity as they do it.

The Protection and Availability Storage (PAS) reduces the amount of "copy" data that is created for snapshots, backup, disaster recovery, and business continuity; testing and development; and analytics to one set of production data, which is then dealt out virtually to applications that need it. Changes to production data are captured only once, deduplicated, and only the unique data is stored and moved to the backup, snapshot, or other application.

Managed from a single interface, PAS allows IT administrators to create service level agreements (SLAs) that dictate how often applications and data are backed up, snapshotted, and replicated for disaster recovery and business continuity. IT can select an application and discover the virtual machines, host computers, and operating systems the application is connected to and bind them all to the SLA. When the administrator wants to recover data, he/she selects the application, sets a restore point from which the data will be recovered from, and selects the restore location.

[ Learn more about what's new in storage. See Dell Storage Forum Brings Wave Of New Products. ]

PAS 5.0 has been enhanced for the service provider market with the addition of multi-tenancy and increased network optimization. The software is now able to handle a 200% capacity increase over previous versions and two times the throughput. It now supports as much as 127 TB and allows faster uploading of data to remote applications via portable hard drives or USB-based storage. Enhancements to PAS 5.0 also include new reporting capabilities and improved workflows, as well as an SLA for Oracle, which allows database cloning to decrease test and development expenses.

The new release of PAS also includes a new feature called DeDup Async, a protocol that combines asynchronous replication with deduplication to improve network bandwidth. It also now supports file system data on Windows and Linux networks running on direct-attached storage, network-attached storage (NAS), or a storage area network (SAN).

Customers of Actifio include Boston University Medical Campus, Navisite, and the City of South Portland. Actifio was founded in 2009 by CEO Ash Ashutosh, formerly of HP. The company is funded for $58.5 million by Andreessen Horowitz, Greylock Ventures, North Bridge Venture Partners, and Advanced Technology Ventures.

From thin provisioning to replication to federation, virtualization options let you reclaim idle disks, speed recovery, and avoid lock-in. Get the new, all-digital Storage Virtualization Guide issue of Network Computing. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.