ProSphere updates storage management for the highly virtualized, cloud-based IT environment.
Today's storage resource management offerings won't cut it in the emerging highly virtualized, cloud-based IT environment, so storage leader EMC has created a new solution with a federated architecture that delivers an end-to-end view of all storage assets, single-pane management, and host-through-storage performance monitoring and analysis. ProSphere features agent-less discovery, 'Smart Groups' policy management, and tight integration with the latest EMC and VMware storage and virtualization technologies.
This is storage management for the cloud computing era, says EMC's Kevin Gray. Consisting of two modules, Core and Ionix Storage Configuration Advisor, ProSphere is fast and easy to install, with a virtual application deployable in under an hour. It will manage more than 1.2 million volumes, 36,000 SAN ports, and 18,000 hosts, he said, and should result in 75% less hardware.
Initially targeted at performance use cases, subsequent releases will focus on additional functionality and eventually ProSphere will replace EMC's Ionix Control Center.
General availability will be the end of July, but the product has been under development for years, and there are currently 20 beta users, said Gray. He said that Storage Configuration Advisor, which was released in 2009, was the company's first version of this tool.
EMC gathered a tremendous amount of experience working with Control Center customers and listening to what they wanted, but the underlying architecture/technology was adopted from the companies they acquired over the last several years, says Bob Laliberte, senior analyst, Enterprise Strategy Group (ESG).
"Storage Configuration Advisor was the first product built using that new technology. A big difference is that EMC has re-architected its SRM software with the cloud in mind. By leveraging this new technology platform, ProSphere is agentless, can deploy as a virtual application in far less time and begin delivering value on day one. In fact EMC claims the installation can be done in less than 30 minutes and fewer than 10 steps."
While some of the competitive solutions from the likes of HP and IBM still require agents, Laliberte says most that still have them are actively working to eliminate them or make them less intrusive. "Performance is a big area of concern for organizations as well."
Secure Application Development - New Best PracticesThe transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Published: 2015-10-15 The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...
Published: 2015-10-15 Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.
Published: 2015-10-15 Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.