News
4/18/2008
07:46 PM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Dedupe's Big Week

Data Domain and Quantum get smacked around pretty good over how "in-line" their products really are. IBM bought Diligent. And deduplication-come-latelies ExaGrid and FalconStor add new gear to the mix. Geez, maybe there really is a market here.

Data Domain and Quantum get smacked around pretty good over how "in-line" their products really are. IBM bought Diligent. And deduplication-come-latelies ExaGrid and FalconStor add new gear to the mix. Geez, maybe there really is a market here.Not that there was ever much question about that. Data deduplication, which really began to hit its stride about 18 months ago, is a backup technique that jettisons redundant files so they're only backed up once. While vendors have gone a little nuts with the marketing and promised compression ratios as outrageous of 20-to-1, users report actual results in the neighborhood of 4-to-1 to 10-to-1, plenty good enough to justify shelling out for dedupe products.

Some worried that dedupe might have a similar trajectory -- and untimely demise -- as continuous data protection (CDP). The snapshotting technology was all the rage about the time dedupe hit the market, only to fizzle when too few users materialized for the sub-second replication technology that also was expensively priced. Recall CDP pioneer and VC darling Revivio limping along till it was acquired by Symantec for a reported $20 million, less than half its $55 million funding.

Dedupe doesn't come with gold-plated pricing; its timesaving benefits make it easier to cost-justify, and storage vendors have been quick to jump on its "green" qualities and lower electrical powering costs.

Whether the Diligent acquisition signals more deals and consolidation is not a sure thing. EMC so far has been content to sign dedupe partnerships with everyone under the sun. NetApp appears to be going the homegrown route. Hitachi Data Systems has a partnership with Diligent, and who knows where Hewlett-Packard is with its dedupe thinking. Just don't be too surprised when one of these top-tier vendors snaps up Data Domain or Quantum or maybe even FalconStor. That's not any wishful thinking or investor whispering -- just markets behaving like markets.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.