News
11/17/2008
05:34 PM
George Crump
George Crump
Commentary
50%
50%

Storage Consolidation?

Every so often you hear the prediction of consolidation in the storage industry, especially during times where the economy is in question. Now is again one of those times and surely we will see some acquisitions here or there, but I think we are a long way off from the classic consolidate down to three vendors scenario. Here's why....

Every so often you hear the prediction of consolidation in the storage industry, especially during times where the economy is in question. Now is again one of those times and surely we will see some acquisitions here or there, but I think we are a long way off from the classic consolidate down to three vendors scenario. Here's why....First, and with some measure of irony, the storage industry is really more about software than it is about hardware. Certainly hardware innovation happens and will continue to happen, but Original Equipment Manufacturers (OEM) like Xyratex are producing phenomenal solutions that allow innovators to focus on the software that wraps around this hardware and becomes what you know as a storage solution.

Innovation like virtualization, deduplication, storage clustering, and Network Attached Storage solutions are coming from what are primarily developers. Having access to solid hardware platforms allows these innovators to focus on creating. This also means that the barrier for entry isn't as high as it would be if these companies had to develop and maintain their own storage hardware offering.

The result is new opportunities and market-driven needs arise as storage companies or a developer of storage software can quickly assemble a team and start working on creating a solution. Cloud storage solutions like those from ParaScale or Cleversafe are great examples. These companies saw an opportunity in cloud-based storage infrastructures and were able to respond to the market.

The net effect of all this is that while there is occasionally some consolidation in the storage industry, and someone gets bought or goes out of business, there are new companies with new ideas being added to the storage community at a much faster pace.

Join us for our upcoming Webcast, SSD: Flash vs. DRAM...and the winner is?

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

CVE-2014-9197
Published: 2015-01-27
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote attackers to obtain sensitive setup and configuration information via a direct request.

CVE-2014-9198
Published: 2015-01-27
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session.

CVE-2014-9646
Published: 2015-01-27
Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.