Vulnerabilities / Threats // Insider Threats
6/12/2012
11:01 AM
50%
50%

Actifio Boosts Storage Efficiency, Capacity

Protection and Availability Storage 5.0 eliminates extra copies of snapshot, backup, disaster recovery, business continuity, and other data.

Data protection specialist Actifio launched Tuesday the next version of its protection and availability software that helps administrators deduplicate, back up, snapshot, and replicate their data and save storage capacity as they do it.

The Protection and Availability Storage (PAS) reduces the amount of "copy" data that is created for snapshots, backup, disaster recovery, and business continuity; testing and development; and analytics to one set of production data, which is then dealt out virtually to applications that need it. Changes to production data are captured only once, deduplicated, and only the unique data is stored and moved to the backup, snapshot, or other application.

Managed from a single interface, PAS allows IT administrators to create service level agreements (SLAs) that dictate how often applications and data are backed up, snapshotted, and replicated for disaster recovery and business continuity. IT can select an application and discover the virtual machines, host computers, and operating systems the application is connected to and bind them all to the SLA. When the administrator wants to recover data, he/she selects the application, sets a restore point from which the data will be recovered from, and selects the restore location.

[ Learn more about what's new in storage. See Dell Storage Forum Brings Wave Of New Products. ]

PAS 5.0 has been enhanced for the service provider market with the addition of multi-tenancy and increased network optimization. The software is now able to handle a 200% capacity increase over previous versions and two times the throughput. It now supports as much as 127 TB and allows faster uploading of data to remote applications via portable hard drives or USB-based storage. Enhancements to PAS 5.0 also include new reporting capabilities and improved workflows, as well as an SLA for Oracle, which allows database cloning to decrease test and development expenses.

The new release of PAS also includes a new feature called DeDup Async, a protocol that combines asynchronous replication with deduplication to improve network bandwidth. It also now supports file system data on Windows and Linux networks running on direct-attached storage, network-attached storage (NAS), or a storage area network (SAN).

Customers of Actifio include Boston University Medical Campus, Navisite, and the City of South Portland. Actifio was founded in 2009 by CEO Ash Ashutosh, formerly of HP. The company is funded for $58.5 million by Andreessen Horowitz, Greylock Ventures, North Bridge Venture Partners, and Advanced Technology Ventures.

From thin provisioning to replication to federation, virtualization options let you reclaim idle disks, speed recovery, and avoid lock-in. Get the new, all-digital Storage Virtualization Guide issue of Network Computing. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I've seen worse.  Last week Tim had a dragon."
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.