Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/12/2008
10:13 AM
George Crump
George Crump
Commentary
50%
50%

Will The Cloud Hurt Storage Companies?

There have been a few articles written lately which claim cloud computing will hurt smaller storage companies like 3Par, Compellent, Xiotech, etc…. The theory being that there will have to be some industry consolidation. I disagree. Cloud computing should be a net gain for storage companies and here's why.

There have been a few articles written lately which claim cloud computing will hurt smaller storage companies like 3Par, Compellent, Xiotech, etc…. The theory being that there will have to be some industry consolidation. I disagree. Cloud computing should be a net gain for storage companies and here's why.First, what is cloud computing and cloud storage? In many ways it is the consolidation of small business and home users. Clearly there are cases where large companies are using cloud services, but for the most part it is small businesses. These are businesses that are too small for the storage systems manufacturers to cater to. The result of this consolidation of small businesses actually means more opportunities. If a cloud service provider consolidates the computing and storage of thousands of small businesses that are too small for these storage players to sell to into one large customer, that is a net gain for these companies.

Second, there is an assumption that cloud services will be the sole domain of a few big players. This will certainly not be the case, at least not initially. If cloud computing and cloud storage really catch on and grow like some analysts believe, there will be too many cloud service providers. Each of these will need to select a storage system based on their needs and business model. Most will buy a combination of fast online storage from the providers mentioned above and archive storage from companies like Permabit, Copan Systems, and Nexsan.

Third, cloud computing is an ideal use case for virtualized storage as provided by these manufacturers. Virtual storage's ability to provision on the fly, scale as the I/O and capacity needs demand while keeping the management of the system easy, are critical for the scale-out business model that a successful cloud services company will possess.

The other suggestion is that cloud service providers will take the route of Google and Amazon and create their own storage infrastructure. New entrants to cloud services will not have the resources or the need to roll their own solution. If, as a cloud service provider, you can remain cost effective without having to invest engineering resources in developing and, more important, supporting a customer storage platform, why would you? It makes more sense to focus on your core service.

What about the big storage players? They each now offer some sort of cloud storage play. Wouldn't it make sense to get all the storage types from a single manufacturer? It might, but there may be a stronger case in the cloud market for best of breed at each tier. Regardless, the challenge that the larger manufacturers face is that there is little to no integration between their cloud storage offerings and their other storage offerings. Other than logo's matching, what is the advantage?

Cloud service providers are typically going to have a heavy IT knowledge base internal to the company, they're going to understand the value of not reinventing the wheel and focus more on optimizing the asset.

Join us for our upcoming Webcast, Cloud Storage 101.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.