Vulnerabilities / Threats // Insider Threats
7/20/2011
09:12 AM
Connect Directly
RSS
E-Mail
50%
50%

Ctera Links Cloud Storage With Data Protection

Appliance gives SMBs a cost-effective way to store data locally for speed, then replicate it in the cloud for disaster recovery.

12 Brawny Business Intelligence Products For SMBs
Slideshow: 12 Brawny Business Intelligence Products For SMBs
(click image for larger view and forslideshow)
Cloud storage vendor Ctera is looking to bring high-speed, easy-to-use, distributed storage to the small and midsize business (SMB) market with its cloud storage gateway appliances. Ctera is leveraging a concept where storage is provided both locally and replicated out in the cloud to meet multiple business needs. The local appliance provides high-speed access to data and backups, while the cloud-based replicated data offers geographic distribution in case of a loss of facility or other major disaster.

Ctera's concept is not hard to fathom and has been attempted over the years by numerous vendors. However, complicated technical hurdles often derailed those attempts. Ctera is taking a slightly different approach, incorporating several technologies into its appliance to create an all-in-one cloud and on-premises storage solution that supports a variety of cloud models, ranging from private to public to hybrid.

According to Raj Mehta, CEO of Infosys International, a Plainview, N.Y.-based solution provider, cloud storage solutions like Ctera's are sorely needed. "Today's cloud-based storage is far too expensive for most small businesses," he says. "The cost per gigabyte far exceeds the cost of on-site storage, yet small businesses need the advantages offered by offsite backup. Ctera's approach combines the speed and economy of local storage with the viability of offsite data preservation, something that small businesses need today."

Ctera has indeed stumbled upon a need centered on disaster recovery. Research firm Gartner says that, despite the high cost of downtime, only 35% of SMBs have a comprehensive disaster recovery plan in place.

However, it is Ctera's approach that makes its offering somewhat unique--a uniqueness that proves important with a plethora of vendors playing in the online backup and storage space.

With its latest offering, the C800 appliance, Ctera has created an all-in-one NAS, file server, and backup appliance that synchronizes data among individual PCs on the network and the C800 drives, then efficiently backs up using Ctera's integrated online backup service. Files can be restored anytime, anywhere using a Web-based interface or from Ctera's Virtual Cloud Drive, an applet that assigns drive letters to cloud storage folders.

Read the rest of this article on Network Computing.

The economies of storage networking have changed dramatically, especially in the options available for small and midsize enterprises. We analyze SMB responses to our 2011 State of Enterprise Storage Survey and discuss which techs will best serve these businesses. Download our report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5700
Published: 2014-09-22
Multiple cross-site scripting (XSS) vulnerabilities in Baby Gekko before 1.2.2f allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/index.php or the (2) username or (3) password parameter in blocks/loginbox/loginbox.template.php to index.php. NOTE: some o...

CVE-2014-0484
Published: 2014-09-22
The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain privileges via vectors related to the "user's environment."

CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-3595
Published: 2014-09-22
Cross-site scripting (XSS) vulnerability in spacewalk-java 1.2.39, 1.7.54, and 2.0.2 in Spacewalk and Red Hat Network (RHN) Satellite 5.4 through 5.6 allows remote attackers to inject arbitrary web script or HTML via a crafted request that is not properly handled when logging.

CVE-2014-3635
Published: 2014-09-22
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows remote attackers to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one m...

Best of the Web
Dark Reading Radio