News
5/21/2009
10:20 AM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

NetApp Buys Data Domain - User Impact

With yesterdays announcement of NetApp's intention to buy Data Domain, a question that needs to be answered by IT professionals is how does this affect them? In our blog on Information Week's sister publication Byte and Switch we looked at the industry impact, but what about the users? There are current customers, c

With yesterdays announcement of NetApp's intention to buy Data Domain, a question that needs to be answered by IT professionals is how does this affect them? In our blog on Information Week's sister publication Byte and Switch we looked at the industry impact, but what about the users? There are current customers, companies that were thinking about buying Data Domain and of course companies that were using an alternative solution. How should each of these parties take this news?First remember that the sale is not official yet and even when it is any real functional change in products will take months if not years to occur. The only fear would be if the acquisition lead to the demise of the Data Domain technology and of all the things to worry about, that is not one of them. You don't pay $1.5 Billion for something and then shut it down, in fact you try real hard not to mess it up.

Current Data Domain Customers

No real change is needed here. I would not be concerned at all about your current products and while there may be a potential slow down in development as part of the integration efforts, I don't expect that to happen. If NetApp is smart they will leave Data Domain as a stand alone entity for a while, integrate where it makes sense, but leaving the core product alone. I expect that to happen.

Current NetApp Customers

For current NetApp customers, things just got a little interesting. NetApp offers it's deduplication technology for free and, according to NetApp anyway, a high percentage of them have enabled it. Certainly if you are one of those customers that has it running don't turn it off, but if you have not enabled it yet, you may want to wait.

As we found in a recent lab test of the NetApp deduplication solution, it does have some weaknesses, and apparently they were concerned enough that they spent a fair amount of money, paying a 40% premium to fix it. If you had not enabled the current NetApp deduplication you may want to wait for a bit to see what NetApp intends to do with their current products and how they might integrate the Data Domain technology into their core products.

You may find that NetApp changes nothing on their core products and keeps the Data Domain technologies as a backup only technology, but as we point out in our recent article "The Role of Compression vs. Deduplication in Primary Storage", NetApp would do well to leverage the technology so they could gain a compression capability along with deduplication.

Potential Customers

If you are evaluating a Data Domain solution right now I'd suggest continuing, especially if it is primarily for backup, even if you are not a NetApp customer. There is little overlap here between the two companies products. While NetApp has a VTL product it has not been nearly as successful as the Data Domain systems. Again I doubt seriously NetApp will do anything that will negatively impact Data Domain in this market.

If you are evaluating NetApp for a primary storage solution I would continue to include them in that mix. The only change that I would make is considering not using their deduplication technology until you can understand what, if any, of the Data Domain technology NetApp intends to incorporate into their core products.

If you are looking at a primary storage optimization solution, you may want to look at some of the storage agnostic solutions like those from Ocarina Networks, Storwize or others to compliment your primary storage selection.

Using an Alternative Solution

If you are already using an alternative solution the first area of impact on you is if something amazing comes out of this relationship that changes the deduplication market. If this happens, it is not going to happen for a while, so if you are happy with your current deduplication strategy, stay put.

The other impact however is your current deduplication technology may be bought by a larger company, but it is hard to know what the reaction of some of the larger storage companies is really going to be, despite what their initial statements will say this week.

All in all this might be that rare acquisition that is good for both companies involved in the transaction and for the storage community in general, but only time will tell.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio