Vulnerabilities / Threats // Insider Threats
01:16 PM

Iomega Unveils NAS Appliance For SMBs

StorCenter px12-450r networked attached storage appliance features Intel Ivy Bridge processor and incorporates McAfee VirusScan Enterprise for security.

Iomega rolled out a new network attached storage (NAS) appliance Thursday that includes a three-year subscription to McAfee Virus Scan Enterprise for small and midsize businesses (SMBs) and distributed enterprises.

The new Iomega StorCenter px12-450r uses the Intel Xeon Processor E3 1200 v2 (dubbed Ivy Bridge and released last month) to increase performance and reduce power consumption. Significant to this announcement is that this is the first Iomega appliance to use an Intel Xeon processor. Previous versions used the Intel Core processor.

The appliance consists of a 12-bay enclosure that can hold as many as a dozen 1-TB to 4-TB SATA disk drives. It connects to the network via 10-GbE ports.

The StorCenter px12-450r supports both block and file operations. It is VMware, EMC Atmos, and Avamar certified and is designed to support virtualization, video surveillance, or public cloud applications.

[ Ignore vendor hype and try these tips to learn How To Pick The Right SMB Storage System. ]

The StorCenter px12-450-r uses four-core Xeon processors with 8 GB of RAM in a 2U (3.5-inch) high enclosure. It is one of the first sub-$10,000 NAS devices in the industry to support McAfee VirusScan Enterprise, according to Jay Krone, EMC's senior director of consumer and small business products. In addition it uses EMC's LifeLine Linux-based operating system software to manage the box and has integrated cloud capabilities.

The appliance is the largest of Iomega's NAS appliances--it pushes right up into EMC VNXe 3100 territory. The px12-450r replaces the px12-350r, which was introduced in August 2011, as the largest NAS appliance Iomega makes.

Further, the appliance supports RAID 0, 1, 10, 5, and 6 protection on a per-storage pool basis and, for block storage, supports 32 LUNs maximum per pool and 128 LUNs maximum per device. For file storage, it supports 256 LUNs maximum per pool and 256 LUNs maximum per device.

Also new to the release of the px appliances is iOS and Android client support for management.

Iomega will add the McAfee VirusScan Enterprise to its other px-Series NAS products, but existing customers will not be able to get the software to add to their appliances.

EMC acquired Iomega in 2008 for $213 million to fill out its SMB storage portfolio. The company also acquired Iomega for its strong distribution channel.

The px12-450-4 is expected to be available in the 3rd quarter of this year. Pricing ranges from $5,499.99, for a disk-less appliance, to $13,000.

From thin provisioning to replication to federation, virtualization options let you reclaim idle disks, speed recovery, and avoid lock-in. Get the new, all-digital Storage Virtualization Guide issue of Network Computing. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-02
Buffer overflow in Canary Labs Trend Web Server before 9.5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet.

Published: 2015-10-02
Cisco NX-OS 6.0(2)U6(0.46) on N3K devices allows remote authenticated users to cause a denial of service (temporary SNMP outage) via an SNMP request for an OID that does not exist, aka Bug ID CSCuw36684.

Published: 2015-10-02
Cisco Email Security Appliance (ESA) 8.5.6-106 and 9.6.0-042 allows remote authenticated users to cause a denial of service (file-descriptor consumption and device reload) via crafted HTTP requests, aka Bug ID CSCuw32211.

Published: 2015-10-01
lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.

Published: 2015-10-01
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.