Vulnerabilities / Threats // Insider Threats
3/27/2012
02:16 PM
Connect Directly
RSS
E-Mail
50%
50%

Zetta Launches SMB Cloud Storage Platform

DataProtect 3.0 handles data protection, archiving, and disaster recovery in small and midsized businesses.

Zetta launched an updated cloud storage platform Tuesday that connects small and midsized businesses' (SMBs') on-premises data with cloud-based storage for data protection, archiving, and disaster recovery.

Called DataProtect 3.0, the service uses two geographically dispersed SAS 70 Type II certified data centers for storing backed up data. A software agent called ZettaMirror is installed on the file server or laptop at the customer's location, which selects the data to synchronize to the cloud, sets retention policies and synchronization schedules, and transports the data contained in a local cache to the cloud in a compressed and encrypted format. After initially seeding the cloud with data, subsequent backups of data are incremental.

The company, which initially launched in 2009 with the Zetta Enterprise Storage Cloud, is now using the WebDAV protocol to connect users to their data in the cloud. The company formerly used the CIFS, NFS, FTP/SFTP, iSCSI, and WEBDAV protocols, as part of a cloud storage gateway installed at the customer's location, to shuttle data to the cloud. The company claims that NFS and CIFS file protocols are fine when you have a local drive or file server, but are inefficient for wide-area communications. WebDAV allows communications between customers' on-premises equipment and Zetta.net's cloud data centers to be done in a rapid, multi-threaded mode, which allows the full available customer bandwidth to be utilized, shrinking backup and recovery time at the protocol level.

[ Learn about another on-premises storage, cloud backup combo. See Quantum Launches Hybrid Data Protection. ]

Further, DataProtect supports the lightweight directory access protocol (LDAP), which allows the IT administrator to determine which files and directories users have access to. With access control determined, users can retrieve data locally from cached data or remotely from the Zetta.net cloud via a Web browser.

In the event of a disaster, IT can mount a Web drive for direct access to the Zetta cloud. With system state backup, Zetta can rebuild the entire server to dissimilar hardware by reloading the operating system and applying the system state and user data files from the Zetta replica.

Additional features of Zetta version 3.0 are support for Macintosh laptops and desktops, Microsoft SQL Server and Windows system state, as well as continuing support for Linux and Windows file servers, Microsoft Exchange, and VMware.

Zetta is funded by Sigma Partners, Accel, and Foundation Venture Capital Group for over $30 million. The company, with 43 employees, was founded in 2008 by veterans of Netscape, Symantec, HP, EqualLogic, RSA, and EMC.

DataProtect starts at $11,400 per year for 2 TB of storage.

Deni Connor is founding analyst for Storage Strategies NOW, an industry analyst firm that focuses on storage, virtualization, and servers.

The pay-as-you go nature of the cloud makes ROI calcula¬tion seem easy. It’s not. Also in the new, all-digital Cloud Calculations InformationWeek supplement: Why infrastructure-as-a-service is a bad deal. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.