Cloud
11/12/2008
10:13 AM
George Crump
George Crump
Commentary
50%
50%

Will The Cloud Hurt Storage Companies?

There have been a few articles written lately which claim cloud computing will hurt smaller storage companies like 3Par, Compellent, Xiotech, etc…. The theory being that there will have to be some industry consolidation. I disagree. Cloud computing should be a net gain for storage companies and here's why.

There have been a few articles written lately which claim cloud computing will hurt smaller storage companies like 3Par, Compellent, Xiotech, etc…. The theory being that there will have to be some industry consolidation. I disagree. Cloud computing should be a net gain for storage companies and here's why.First, what is cloud computing and cloud storage? In many ways it is the consolidation of small business and home users. Clearly there are cases where large companies are using cloud services, but for the most part it is small businesses. These are businesses that are too small for the storage systems manufacturers to cater to. The result of this consolidation of small businesses actually means more opportunities. If a cloud service provider consolidates the computing and storage of thousands of small businesses that are too small for these storage players to sell to into one large customer, that is a net gain for these companies.

Second, there is an assumption that cloud services will be the sole domain of a few big players. This will certainly not be the case, at least not initially. If cloud computing and cloud storage really catch on and grow like some analysts believe, there will be too many cloud service providers. Each of these will need to select a storage system based on their needs and business model. Most will buy a combination of fast online storage from the providers mentioned above and archive storage from companies like Permabit, Copan Systems, and Nexsan.

Third, cloud computing is an ideal use case for virtualized storage as provided by these manufacturers. Virtual storage's ability to provision on the fly, scale as the I/O and capacity needs demand while keeping the management of the system easy, are critical for the scale-out business model that a successful cloud services company will possess.

The other suggestion is that cloud service providers will take the route of Google and Amazon and create their own storage infrastructure. New entrants to cloud services will not have the resources or the need to roll their own solution. If, as a cloud service provider, you can remain cost effective without having to invest engineering resources in developing and, more important, supporting a customer storage platform, why would you? It makes more sense to focus on your core service.

What about the big storage players? They each now offer some sort of cloud storage play. Wouldn't it make sense to get all the storage types from a single manufacturer? It might, but there may be a stronger case in the cloud market for best of breed at each tier. Regardless, the challenge that the larger manufacturers face is that there is little to no integration between their cloud storage offerings and their other storage offerings. Other than logo's matching, what is the advantage?

Cloud service providers are typically going to have a heavy IT knowledge base internal to the company, they're going to understand the value of not reinventing the wheel and focus more on optimizing the asset.

Join us for our upcoming Webcast, Cloud Storage 101.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.