Vulnerabilities / Threats // Insider Threats
9/20/2011
11:11 AM
50%
50%

D-Link Unveils 32TB Storage Arrays For SMBs

The company's iSCSI arrays aren't just for the smallest shops anymore.

D-Link announced two new storage arrays Tuesday for small to midsized businesses (SMBs): The DSN-4000 Series xStack iSCSI SAN arrays, which have a maximum capacity of 32 TB.

When I think of D-Link, I think of that wireless Internet router I bought years ago from Circuit City. D-Link had never entered my mind for storage. Until now. It turns out that the company has models ranging from the consumer-class, two-bay ShareCenter network storage with USB Printer Port (2 TB) to the new DSN-4000 Series, which has a maximum capacity of 160 TB.

The DSN-4000 Series consists of the DSN-4100 and DSN-4200 storage arrays and the DSN-4000 3U 16-bay expansion array. Both arrays use iSCSi to connect to the network and both support a mixture of serial ATA (SATA) and serial attached SCSI (SAS) drives. The arrays replace the previous generation DSN-3200-10 and DSN-2100-10. Further, each array is available in a 3U (5.25-inch) high enclosure that holds 16 2-TB drives.

As many as 80 drives can be supported by adding the drive to the DSN-4000 expansion array for 160 TB of external storage.

[Surrounded by data? Growing storage without end? Learn how to cope: read The Storage Problem You Can't Ignore.]

D-Link doesn't restrict the type of drive used to a single manufacturer. Customers can choose from a variety of manufacturers to populate their arrays.

The DSN-4000 series also offers virtualization capability at the volume level to enable data migration, volume expansion, or reconfiguration. Since drives are not tied to their expansion chassis, they can be migrated among xStack Storage Arrays.

The DSN-4200 differs from the DSN-4100 in the number of data ports connecting it to the network. The DSN-4100 has four 1-GbE ports; the DSN-4200 has eight ports.

D-Link storage arrays are expected to be available in November from D-Link and online retailers such as CompuUSA, TigerDirect, NewEgg, and Amazon. The DSN-4100 is priced at $4,999.99; the DSN-4200 is $6,199.99; and, the D-Link DSN-4000 is $3,199.99.

Deni Connor is founding analyst for Storage Strategies NOW, an industry analyst firm that focuses on storage, virtualization, and servers.

InformationWeek and Network Computing have published an in-depth look at storage utilization and deduplication. Download the report now (free registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.