Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

2/21/2008
10:19 PM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

Where Storage Gets Innovative

There are lots of good barometers out there -- the Dow Jones Industrial Average comes to mind, as does the Consumer Confidence Index. A little closer to home, this gauge of where VCs and angel investors are placing their bets tells you a lot about where storage is headed in the next 12 months.

There are lots of good barometers out there -- the Dow Jones Industrial Average comes to mind, as does the Consumer Confidence Index. A little closer to home, this gauge of where VCs and angel investors are placing their bets tells you a lot about where storage is headed in the next 12 months.I've always liked Byte & Switch's top 10 startups feature. Full disclosure: I was editor of the site from October 2005 to June 2007, but this cataloguing of what's attracting investment in storage pre-dated my tenure there.

What I like about the exercise is that it's a good temperature-taking of where the big vendors fall short, and where customers are willing to pony up (sometimes big bucks) for a highly specific feature. And unlike 20 years ago, acquisitions largely have replaced any kind of medium or long-term R&D among the big guys. So these kinds of lists often spell out the players in future M&A dramas.

Some interesting standouts among the mix -- a PCIe-based card that boosts server memory and capacity by as much as a 100 times. Survivable data also emerged as a thread among the startups, with ruggedized storage devices that can withstand wind, water, plate tectonics, or Dick Cheney's withering stare. A gypsum-encased USB drive to keep your data intact at temperatures of 1700 degrees? It may be just the thing for getting through summer if global warming theorists are on track.

There's also plenty of add-ons for virtualized server access and storage deployment. Crafty Reldata has found a way to provide back-end capacity for other vendors' arrays -- potentially breaking the logjam over Tier 1 vendors whose storage virtualization products have languished due to cost and complexity. And Xisgo is doing some cool things with virtualized I/O that others are just starting to talk about.

The feature is as good a gauge to the nature of the deals and product breakthroughs we're likely to see this year. And you don't have to worry about it ruining your 401(k) or spooking your own customers.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-2916
PUBLISHED: 2019-11-15
qtnx 0.9 stores non-custom SSH keys in a world-readable configuration file. If a user has a world-readable or world-executable home directory, another local system user could obtain the private key used to connect to remote NX sessions.
CVE-2019-12757
PUBLISHED: 2019-11-15
Symantec Endpoint Protection (SEP), prior to 14.2 RU2 & 12.1 RU6 MP10 and Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to 12.1 RU6 MP10d (12.1.7510.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt t...
CVE-2019-12758
PUBLISHED: 2019-11-15
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to an unsigned code execution vulnerability, which may allow an individual to execute code without a resident proper digital signature.
CVE-2019-12759
PUBLISHED: 2019-11-15
Symantec Endpoint Protection Manager (SEPM) and Symantec Mail Security for MS Exchange (SMSMSE), prior to versions 14.2 RU2 and 7.5.x respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software applicat...
CVE-2019-18372
PUBLISHED: 2019-11-15
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.