Vulnerabilities / Threats // Insider Threats
3/27/2012
02:16 PM
50%
50%

Zetta Launches SMB Cloud Storage Platform

DataProtect 3.0 handles data protection, archiving, and disaster recovery in small and midsized businesses.

Zetta launched an updated cloud storage platform Tuesday that connects small and midsized businesses' (SMBs') on-premises data with cloud-based storage for data protection, archiving, and disaster recovery.

Called DataProtect 3.0, the service uses two geographically dispersed SAS 70 Type II certified data centers for storing backed up data. A software agent called ZettaMirror is installed on the file server or laptop at the customer's location, which selects the data to synchronize to the cloud, sets retention policies and synchronization schedules, and transports the data contained in a local cache to the cloud in a compressed and encrypted format. After initially seeding the cloud with data, subsequent backups of data are incremental.

The company, which initially launched in 2009 with the Zetta Enterprise Storage Cloud, is now using the WebDAV protocol to connect users to their data in the cloud. The company formerly used the CIFS, NFS, FTP/SFTP, iSCSI, and WEBDAV protocols, as part of a cloud storage gateway installed at the customer's location, to shuttle data to the cloud. The company claims that NFS and CIFS file protocols are fine when you have a local drive or file server, but are inefficient for wide-area communications. WebDAV allows communications between customers' on-premises equipment and Zetta.net's cloud data centers to be done in a rapid, multi-threaded mode, which allows the full available customer bandwidth to be utilized, shrinking backup and recovery time at the protocol level.

[ Learn about another on-premises storage, cloud backup combo. See Quantum Launches Hybrid Data Protection. ]

Further, DataProtect supports the lightweight directory access protocol (LDAP), which allows the IT administrator to determine which files and directories users have access to. With access control determined, users can retrieve data locally from cached data or remotely from the Zetta.net cloud via a Web browser.

In the event of a disaster, IT can mount a Web drive for direct access to the Zetta cloud. With system state backup, Zetta can rebuild the entire server to dissimilar hardware by reloading the operating system and applying the system state and user data files from the Zetta replica.

Additional features of Zetta version 3.0 are support for Macintosh laptops and desktops, Microsoft SQL Server and Windows system state, as well as continuing support for Linux and Windows file servers, Microsoft Exchange, and VMware.

Zetta is funded by Sigma Partners, Accel, and Foundation Venture Capital Group for over $30 million. The company, with 43 employees, was founded in 2008 by veterans of Netscape, Symantec, HP, EqualLogic, RSA, and EMC.

DataProtect starts at $11,400 per year for 2 TB of storage.

Deni Connor is founding analyst for Storage Strategies NOW, an industry analyst firm that focuses on storage, virtualization, and servers.

The pay-as-you go nature of the cloud makes ROI calcula¬tion seem easy. It’s not. Also in the new, all-digital Cloud Calculations InformationWeek supplement: Why infrastructure-as-a-service is a bad deal. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.