Vulnerabilities / Threats // Insider Threats
3/27/2012
02:16 PM
50%
50%

Zetta Launches SMB Cloud Storage Platform

DataProtect 3.0 handles data protection, archiving, and disaster recovery in small and midsized businesses.

Zetta launched an updated cloud storage platform Tuesday that connects small and midsized businesses' (SMBs') on-premises data with cloud-based storage for data protection, archiving, and disaster recovery.

Called DataProtect 3.0, the service uses two geographically dispersed SAS 70 Type II certified data centers for storing backed up data. A software agent called ZettaMirror is installed on the file server or laptop at the customer's location, which selects the data to synchronize to the cloud, sets retention policies and synchronization schedules, and transports the data contained in a local cache to the cloud in a compressed and encrypted format. After initially seeding the cloud with data, subsequent backups of data are incremental.

The company, which initially launched in 2009 with the Zetta Enterprise Storage Cloud, is now using the WebDAV protocol to connect users to their data in the cloud. The company formerly used the CIFS, NFS, FTP/SFTP, iSCSI, and WEBDAV protocols, as part of a cloud storage gateway installed at the customer's location, to shuttle data to the cloud. The company claims that NFS and CIFS file protocols are fine when you have a local drive or file server, but are inefficient for wide-area communications. WebDAV allows communications between customers' on-premises equipment and Zetta.net's cloud data centers to be done in a rapid, multi-threaded mode, which allows the full available customer bandwidth to be utilized, shrinking backup and recovery time at the protocol level.

[ Learn about another on-premises storage, cloud backup combo. See Quantum Launches Hybrid Data Protection. ]

Further, DataProtect supports the lightweight directory access protocol (LDAP), which allows the IT administrator to determine which files and directories users have access to. With access control determined, users can retrieve data locally from cached data or remotely from the Zetta.net cloud via a Web browser.

In the event of a disaster, IT can mount a Web drive for direct access to the Zetta cloud. With system state backup, Zetta can rebuild the entire server to dissimilar hardware by reloading the operating system and applying the system state and user data files from the Zetta replica.

Additional features of Zetta version 3.0 are support for Macintosh laptops and desktops, Microsoft SQL Server and Windows system state, as well as continuing support for Linux and Windows file servers, Microsoft Exchange, and VMware.

Zetta is funded by Sigma Partners, Accel, and Foundation Venture Capital Group for over $30 million. The company, with 43 employees, was founded in 2008 by veterans of Netscape, Symantec, HP, EqualLogic, RSA, and EMC.

DataProtect starts at $11,400 per year for 2 TB of storage.

Deni Connor is founding analyst for Storage Strategies NOW, an industry analyst firm that focuses on storage, virtualization, and servers.

The pay-as-you go nature of the cloud makes ROI calcula¬tion seem easy. It’s not. Also in the new, all-digital Cloud Calculations InformationWeek supplement: Why infrastructure-as-a-service is a bad deal. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0211
Published: 2015-06-01
mod/lti/ajax.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 does not consider the moodle/course:manageactivities and mod/lti:addinstance capabilities before proceeding with registered-tool list searches, which allows remote authenticated users to obtain s...

CVE-2015-0212
Published: 2015-06-01
Cross-site scripting (XSS) vulnerability in course/pending.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted course summary.

CVE-2015-0213
Published: 2015-06-01
Multiple cross-site request forgery (CSRF) vulnerabilities in (1) editcategories.html and (2) editcategories.php in the Glossary module in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allow remote attackers to hijack the authentication of unspecified victims.

CVE-2015-0214
Published: 2015-06-01
message/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote authenticated users to bypass a messaging-disabled setting via a web-services request, as demonstrated by a people-search request.

CVE-2015-0215
Published: 2015-06-01
calendar/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote authenticated users to obtain sensitive calendar-event information via a web-services request.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?