News
7/14/2011
10:22 AM
50%
50%

EMC Gives Storage Management A Cloud Facelift

ProSphere updates storage management for the highly virtualized, cloud-based IT environment.

Today's storage resource management offerings won't cut it in the emerging highly virtualized, cloud-based IT environment, so storage leader EMC has created a new solution with a federated architecture that delivers an end-to-end view of all storage assets, single-pane management, and host-through-storage performance monitoring and analysis. ProSphere features agent-less discovery, 'Smart Groups' policy management, and tight integration with the latest EMC and VMware storage and virtualization technologies.

This is storage management for the cloud computing era, says EMC's Kevin Gray. Consisting of two modules, Core and Ionix Storage Configuration Advisor, ProSphere is fast and easy to install, with a virtual application deployable in under an hour. It will manage more than 1.2 million volumes, 36,000 SAN ports, and 18,000 hosts, he said, and should result in 75% less hardware.

Initially targeted at performance use cases, subsequent releases will focus on additional functionality and eventually ProSphere will replace EMC's Ionix Control Center.

General availability will be the end of July, but the product has been under development for years, and there are currently 20 beta users, said Gray. He said that Storage Configuration Advisor, which was released in 2009, was the company's first version of this tool.

EMC gathered a tremendous amount of experience working with Control Center customers and listening to what they wanted, but the underlying architecture/technology was adopted from the companies they acquired over the last several years, says Bob Laliberte, senior analyst, Enterprise Strategy Group (ESG).

"Storage Configuration Advisor was the first product built using that new technology. A big difference is that EMC has re-architected its SRM software with the cloud in mind. By leveraging this new technology platform, ProSphere is agentless, can deploy as a virtual application in far less time and begin delivering value on day one. In fact EMC claims the installation can be done in less than 30 minutes and fewer than 10 steps."

While some of the competitive solutions from the likes of HP and IBM still require agents, Laliberte says most that still have them are actively working to eliminate them or make them less intrusive. "Performance is a big area of concern for organizations as well."

Read the rest of this article on Network Computing.

Network Computing has published an in-depth report on deduplication and disaster recovery. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.