News
7/14/2011
10:22 AM
50%
50%

EMC Gives Storage Management A Cloud Facelift

ProSphere updates storage management for the highly virtualized, cloud-based IT environment.

Today's storage resource management offerings won't cut it in the emerging highly virtualized, cloud-based IT environment, so storage leader EMC has created a new solution with a federated architecture that delivers an end-to-end view of all storage assets, single-pane management, and host-through-storage performance monitoring and analysis. ProSphere features agent-less discovery, 'Smart Groups' policy management, and tight integration with the latest EMC and VMware storage and virtualization technologies.

This is storage management for the cloud computing era, says EMC's Kevin Gray. Consisting of two modules, Core and Ionix Storage Configuration Advisor, ProSphere is fast and easy to install, with a virtual application deployable in under an hour. It will manage more than 1.2 million volumes, 36,000 SAN ports, and 18,000 hosts, he said, and should result in 75% less hardware.

Initially targeted at performance use cases, subsequent releases will focus on additional functionality and eventually ProSphere will replace EMC's Ionix Control Center.

General availability will be the end of July, but the product has been under development for years, and there are currently 20 beta users, said Gray. He said that Storage Configuration Advisor, which was released in 2009, was the company's first version of this tool.

EMC gathered a tremendous amount of experience working with Control Center customers and listening to what they wanted, but the underlying architecture/technology was adopted from the companies they acquired over the last several years, says Bob Laliberte, senior analyst, Enterprise Strategy Group (ESG).

"Storage Configuration Advisor was the first product built using that new technology. A big difference is that EMC has re-architected its SRM software with the cloud in mind. By leveraging this new technology platform, ProSphere is agentless, can deploy as a virtual application in far less time and begin delivering value on day one. In fact EMC claims the installation can be done in less than 30 minutes and fewer than 10 steps."

While some of the competitive solutions from the likes of HP and IBM still require agents, Laliberte says most that still have them are actively working to eliminate them or make them less intrusive. "Performance is a big area of concern for organizations as well."

Read the rest of this article on Network Computing.

Network Computing has published an in-depth report on deduplication and disaster recovery. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.