News
7/14/2011
10:22 AM
50%
50%

EMC Gives Storage Management A Cloud Facelift

ProSphere updates storage management for the highly virtualized, cloud-based IT environment.

Today's storage resource management offerings won't cut it in the emerging highly virtualized, cloud-based IT environment, so storage leader EMC has created a new solution with a federated architecture that delivers an end-to-end view of all storage assets, single-pane management, and host-through-storage performance monitoring and analysis. ProSphere features agent-less discovery, 'Smart Groups' policy management, and tight integration with the latest EMC and VMware storage and virtualization technologies.

This is storage management for the cloud computing era, says EMC's Kevin Gray. Consisting of two modules, Core and Ionix Storage Configuration Advisor, ProSphere is fast and easy to install, with a virtual application deployable in under an hour. It will manage more than 1.2 million volumes, 36,000 SAN ports, and 18,000 hosts, he said, and should result in 75% less hardware.

Initially targeted at performance use cases, subsequent releases will focus on additional functionality and eventually ProSphere will replace EMC's Ionix Control Center.

General availability will be the end of July, but the product has been under development for years, and there are currently 20 beta users, said Gray. He said that Storage Configuration Advisor, which was released in 2009, was the company's first version of this tool.

EMC gathered a tremendous amount of experience working with Control Center customers and listening to what they wanted, but the underlying architecture/technology was adopted from the companies they acquired over the last several years, says Bob Laliberte, senior analyst, Enterprise Strategy Group (ESG).

"Storage Configuration Advisor was the first product built using that new technology. A big difference is that EMC has re-architected its SRM software with the cloud in mind. By leveraging this new technology platform, ProSphere is agentless, can deploy as a virtual application in far less time and begin delivering value on day one. In fact EMC claims the installation can be done in less than 30 minutes and fewer than 10 steps."

While some of the competitive solutions from the likes of HP and IBM still require agents, Laliberte says most that still have them are actively working to eliminate them or make them less intrusive. "Performance is a big area of concern for organizations as well."

Read the rest of this article on Network Computing.

Network Computing has published an in-depth report on deduplication and disaster recovery. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.