ProSphere updates storage management for the highly virtualized, cloud-based IT environment.
Today's storage resource management offerings won't cut it in the emerging highly virtualized, cloud-based IT environment, so storage leader EMC has created a new solution with a federated architecture that delivers an end-to-end view of all storage assets, single-pane management, and host-through-storage performance monitoring and analysis. ProSphere features agent-less discovery, 'Smart Groups' policy management, and tight integration with the latest EMC and VMware storage and virtualization technologies.
This is storage management for the cloud computing era, says EMC's Kevin Gray. Consisting of two modules, Core and Ionix Storage Configuration Advisor, ProSphere is fast and easy to install, with a virtual application deployable in under an hour. It will manage more than 1.2 million volumes, 36,000 SAN ports, and 18,000 hosts, he said, and should result in 75% less hardware.
Initially targeted at performance use cases, subsequent releases will focus on additional functionality and eventually ProSphere will replace EMC's Ionix Control Center.
General availability will be the end of July, but the product has been under development for years, and there are currently 20 beta users, said Gray. He said that Storage Configuration Advisor, which was released in 2009, was the company's first version of this tool.
EMC gathered a tremendous amount of experience working with Control Center customers and listening to what they wanted, but the underlying architecture/technology was adopted from the companies they acquired over the last several years, says Bob Laliberte, senior analyst, Enterprise Strategy Group (ESG).
"Storage Configuration Advisor was the first product built using that new technology. A big difference is that EMC has re-architected its SRM software with the cloud in mind. By leveraging this new technology platform, ProSphere is agentless, can deploy as a virtual application in far less time and begin delivering value on day one. In fact EMC claims the installation can be done in less than 30 minutes and fewer than 10 steps."
While some of the competitive solutions from the likes of HP and IBM still require agents, Laliberte says most that still have them are actively working to eliminate them or make them less intrusive. "Performance is a big area of concern for organizations as well."
Dark Reading Tech Digest, Dec. 19, 2014Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
10 Recommendations for Outsourcing SecurityEnterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
5 Top Tips For Outsourced SecurityIt's one thing to hire a third-party developer to build a mobile app. It's quite another to trust a pen tester, MSSP, or DDoS protection firm. But the fact is, the threat landscape is complex, and few organizations can keep security completely in house. Here's how to decide what to outsource and select and manage providers.
Published: 2015-02-26 The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...
Published: 2015-02-26 Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun1...
Published: 2015-02-26 Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770.
Published: 2015-02-26 Cross-site request forgery (CSRF) vulnerability in the web GUI in Cisco Application Networking Manager (ANM), and Device Manager (DM) on Cisco 4710 Application Control Engine (ACE) appliances, allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo99753.
Published: 2015-02-26 Multiple cross-site scripting (XSS) vulnerabilities in zencart-ja (aka Zen Cart Japanese edition) 1.3 jp through 220.127.116.11 jp8 and 1.5 ja through 1.5.1 ja allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to admin/includes/init_includes/init_sanitize.php an...
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.