Identify the Right Gateway Product for Storage in the External Cloud

Size: px
Start display at page:

Download "Identify the Right Gateway Product for Storage in the External Cloud"

Transcription

1 G Identify the Right Gateway Product for Storage in the External Cloud Published: 25 August 2011 Analyst(s): Pushan Rinnen, Gene Ruth, Stanley Zaffos This report analyzes the emerging external gateway market profiles some key vendors products for Gartner's user clients. As external offerings become increasingly available, it is important for user clients to know what gateway choices are available when they want to leverage to augment or replace their onpremises storage. Key Findings Gateways for external augment or replace local storage with play an important role in the overall success of external services. These gateways are not yet ready for enterprise-scale data center deployment but can address branch office storage requirements in many cases. The majority of the data that the gateways push to the external cloud today are latencyinsensitive workloads, such as backup, disaster recovery, inactive file data. Many vendors in this space are startups with very limited installed bases. Recommendations Make gateways part of any plan to access, but proceed cautiously due to the nascent nature of the gateway product category. Plan to use multiple public cloud providers to minimize dependence on a single service provider. Create mitigation plans to access cloud data in case the gateway vendors exit the market. Choose gateways that compare well against conventional SAN or NAS disk arrays map workloads that best fit the gateway the cloud.

2 What You Need to Know An external cloud is an IT capability that is offered as a service to a business that is not hosted by the business's IT organization. An external cloud can be public or private, but must be implemented by a third-party service provider. With the emergence of external public services offerings such as Amazon S3 has come a new crop of independent cloud gateway vendors products to help users leverage public. At the same time, some cloud gateways have been developed to augment external private services. These gateways are onpremises appliances that offer an easier-to-manage /or more efficient way to migrate data to an external cloud. Gateway architectures vary by vendor are often tailored to address specific workload types. Some use embedded internal storage as a local cache to boost performance; others focus on local storage tiering with as an extended tier. Some are dedicated for backup data only; some are designed to archive older files to an external cloud; others are more versatile with different use cases. Some focus on supporting multiple public platforms, while others focus more on supporting external or internal private services. The br-new products designed from the ground up tend to have more comprehensive features for the cloud, whereas repositioned products are still weak in their cloud support capabilities. This research doesn't include gateways available only through a specific service offering, as users of that particular services offering would not have the option of choosing a different gateway. Analysis Market Technology Definitions Segmentation Gartner defines an external cloud as an IT capability that is offered as a service to a business that is not hosted by the business's own IT organization. An external cloud can be public or private, but must be implemented by a third-party service provider. All public clouds are external, but a private cloud can be internal or external. This research focuses on gateways that bridge to external. Gartner defines public as a storage utility offering owned by a public cloud service provider that uses the pay-per-use model software-agnostic, reservationless provisioning. Examples include Amazon S3, Microsoft Windows Azure Storage Nirvanix. External private is defined as a storage utility offering owned by an external private cloud service provider whose storage services are subscribed to by a select group of organizations not just any consumer. Examples include some regional telecom providers managed service providers. The external gateway market includes a new set of products that function as onpremises gateways (hardware or software appliances) to. They connect to external via Internet APIs or protocols such as REST or HTTP. They support local servers or clients via stard storage access protocols such as Internet Small Computer System Interface (iscsi), Network File System (NFS) Common Internet File System (CIFS). Architecturally, they can be segmented into the following three models: Page 2 of 10 Gartner, Inc. G

3 Cache devices The gateway provides advanced caching algorithms to mask performance limitations associated with. Examples of this type of gateway include Nasuni, Riverbed Whitewater, TwinStrata. All of these focus on leveraging public. Tiered devices The gateway provides on-premises storage tiers such as solid-state drives (SSDs) disk drives, as well as cloud tiers that reside at service providers. Two distinct product types exist within this category. One has integrated local storage tiers, such as StorSimple, which was designed from the ground up for leveraging public. The other is repositioned file virtualization devices that can migrate or tier data among other onpremises storage arrays the cloud. Examples include EMC's Cloud Tiering Appliance F5 Networks' ARX Cloud Extender, both of which do not store user data on the appliances. Copy/synchronization devices The gateway provides remote replication synchronization services among the same devices deployed at different sites (both user premises external private cloud providers' sites), similar to those offered by conventional storage arrays for an internal cloud. Examples include CTERA Networks Panzura. Gartner also calls those gateways with embedded local primary storage "hybrid storage appliances," which are designed to serve limited local primary storage for the most active data, while pushing relatively inactive data to the public cloud via an embedded gateway that connects to the seamlessly. To the users hosts, it behaves as a normal storage system. The term "hybrid" is used to describe the attribute of combining local storage. From a data flow perspective, it is a storage target or an in-b appliance that intercepts all input/outputs (I/Os) to from a virtual volume or file system. From a storage system perspective, it uses sophisticated cache management algorithms to minimize data flows to from the public cloud by satisfying as many I/Os as possible from local storage. Data is often compressed or deduplicated in the appliance to increase its effective cache capacity, when data is actually transferred to or from the cloud; WAN-optimized controller (WOC) techniques are often used to reduce the impact of link latency on performance. Examples of hybrid storage appliances include CTERA, Nasuni, Panzura, StorSimple TwinStrata. Introduction External gateways are a nascent phenomenon, because external services are still in the early stage of development. A viable offering of external cloud gateway appliances didn't really emerge until Nevertheless, as long as external remains a viable alternative to customers' internal storage deployment, we expect those gateway products will continue to have their value, such as boosting performance, increasing storage efficiency simplifying management. Gartner expects the gateway market to exp, enable accelerate the acceptance of external. Market Analysis External gateways are peripherals to external services. The gateways' future, therefore, is very much dependent on the success of overall external services, as well as on reliable products from solid vendors. For enterprise customers, gateways are an Gartner, Inc. G Page 3 of 10

4 essential component of solution, as they can help overcome some key issues associated with external such as performance. While public offers potential cost agility advantages, which fit the need for consumers ad hoc projects such as test development, they may frequently suffer from lower security, weaker SLAs, looser integration with on-site applications, lower reliability. The lack of transparency in storage architecture data protection schemes deployed by some major public service providers does not help generate confidence among business customers who want to develop tighter deeper long-term relationships. In contrast, external private clouds tend to have higher-cost storage infrastructure because they often acquire commercial storage systems instead of building their own infrastructure. However, their strengths may include stronger SLAs, deeper integration with on-site applications higher levels of reliability security can often justify the higher cost. Because they deploy commercial products, whose features functions are more readily available, business customers with internal storage know-how may feel more comfortable about leveraging external to gain the benefits of agility, such as global data accessibility, without internal private infrastructure, outsourced management of backup disaster recovery, potentially lower total cost of ownership. Overall, all hybrid storage appliances those gateways with internal storage for local cache or primary storage can offer predictable performance operations for local users, in some cases, can replace on-premises disk arrays. However, some gateways are designed to alleviate some of the pain points associated with using public specifically. For example, support of simultaneous access to more than one public cloud, cloud clones, encryption of data in flight at rest will increase the data availability, recoverability security in the public cloud. These gateways are typically offered by startups. Other gateways are created by vendors that want to use the gateway as a facilitator to increase their storage platform sales to the external private cloud service providers. For example, EMC's F5's appliances have been around for many years to provide user-transparent file migration among different local tiers of storage have recently been retrofitted with access protocols such as REST. They lack some cloud-focused features such as deduplication, WAN optimization cloud cloning. They may or may not be able to preserve the native deduplication on the local storage systems when they move data to the cloud. Key Vendors Products in the Market Although we segment external gateway devices into three architectural categories based on some key attributes, every single one is designed somewhat differently. Those designed from the ground up for public are typically from startups, including Nasuni, StorSimple TwinStrata; whereas startups CTERA Panzura focus more on providing infrastructure technologies for hybrid cloud private cloud service providers. Established vendors such as EMC Hitachi aim to protect their own turf by offering gateways to augment their respective cloud infrastructure storage platforms Atmos Hitachi Content Platform (HCP). Riverbed is leveraging its WAN optimization know-how to enter a new market. Table 1 groups the vendors products by the three categories lists some of the key feature functions as a reference for users who plan to adopt external. Page 4 of 10 Gartner, Inc. G

5 Table 1. External Cloud Gateways Comparison, 2011 Company/ Product Cloud Services APIs OS/Apps Supported Encryption Policy to the Cloud Architecture Client- Side Protocols Dedup-lication/ Compres-sion WAN Optimi-zation Snapshots/ Cloning in the Cloud Gateway Storage Details CTERA/ Cloud Attached Storage Cloud Portal Copy/ synch Hybrid that supports CTERA Portal, which can further connect to public CIFS, NFS, iscsi Microsoft Exchange, SQL, Active Directory SharePoint AES-256 encryption, SHA-1 fingerprint File metadata-based policy Block-level dedupe, which can be applied across multiple appliances/ sites; compression ratio between 2x 20x Leverage dedupe; only change delta sent to the cloud Snapshots can be stored both locally in the cloud; portal storage nodes can be cloned for HA 2-8 SATA drives, delivering thinprovi-sioned storage for data metadata Panzura Copy/ synch Hybrid (REST or SOAP Rsync over SSH, NFS), which can further connect to public etc. NFS/ CIFS, iscsi or MS SQL API, VTL/ NDMP to interface tape or disk backup software MS Share- Point SQL; Symantec NetBackup or backup scripts Yes (RSA-2048 AES-256 Replication policies between nodes or between a node one or more public cloud provider; can go down to directory-level granularity Live, local or global block dedupe dictionary part of metadata; compres-sion ratio: up to 95% Only the data change delta is exchanged across controllers; where possible, multiple TCP sessions are used in parallel to reduce the latency effects. Policybased at directory level; cloning is at directory or file level; metadata are sent to all controllers for synchronization; data are mountable from multiple locations. HDDs (8TB 24TB) or SSDs or both; RAID 10 Gartner, Inc. G Page 5 of 10

6 Hitachi/ HDI Cache Private cloud based on Hitachi Content Platform CIFS, NFS CIFS/NFS files No (HCP offers encryption for data at rest) All copied to cloud No (HCP in the cloud has single instance store compression) Yes (via partnership with Silver Peak) No local or SAN attached; store cloud replicated files cloud archived stubs Nasuni/ Filer Cache Public, such as Amazon S3, EMC Atmos, Microsoft Windows Azure Storage, Nirvanix, Rackspace, etc. CIFS NFS Any that work with CIFS/ NFS On-premises encryption with OpenPGP/ AES-256 Can set cache size, schedule the frequency retention periods of (unlimited), volume quotas Subfile based dedupe; average 30% (up to 90%) space savings Only change delta at subfile level between snapshot intervals is sent to the cloud after being compressed File system snapshot hourly by default sent to the cloud; customer can restore to any point in the life of a file, directory or file system. Software installed on a virtual server, emulating Windows file server; caches both data metadata with local storage attached to the virtual server; can also cache. Riverbed/ Whitewater Cache Public such as Amazon S3 EMC Atmos, etc. CIFS, NFS Backup target for NetBackup, Backup Exec, TSM, NetWorker, Vizioncore CA ARCserve User existing solution Use thirdparty backup software policy Subblock granular (to 16 bytes) dedupe; can be applied across volumes; patented algorithm used by Steelhead; compression ratio: 20-30x Transactionally aware, parallel cloud object store: reduce latency for REST API No not used for primary data Unified RAM HDD cache (7TB or 11TB raw); RAID 6 Page 6 of 10 Gartner, Inc. G

7 TwinStrata Cache Public, such as Amazon S3, as well as cloud storage based on EMC AtmosScality Ring, MezeoCloud, etc. iscsi All apps collaboration (Exchange, VMware), backup/dr (Backup Exec, CA ARCserve) Yes (AES-256) Can set policy on local cache cloud provider parameters No dedupe; Gzip compatible No In-cloud triggered by users Cloud volume is partially cached locally; cloud replica is 100% cached locally via async replication. Dynamic adaptive caching EMC/ Cloud Tiering Appliance Tiered CIFS, NFS CIFS/NFS files No Public or private based on EMC Atmos Schedulable migration policy Compressed files stay compressed in different tiers No No, cannot send local to the cloud Appli-ances do not store or cache data, but store metadata; can run on VMs F5/ARX Cloud Extender Tiered CIFS CIFS files Yes (AES-256) Public or private based on EMC Atmos, NetApp StorageGRID Schedulable migration policy No (deduped files will be hydrated before sending to the cloud) No No, cannot send local to the cloud Software runs on a Windows file server, with local storage caching metadata for files sent to the cloud; supports virtual server HA or physical server clustering Gartner, Inc. G Page 7 of 10

8 StorSimple Tiered Public such as Amazon S3 Windows Azure based on EMC Atmos iscsi VMware 3.5/4.0/4.1, Hyper-V, Windows Server 2008 R2 User existing encryption solution or StorSimple's encryption with AES-256 Automatically moves data across SSD, SAS cloud tiers based on access frequency age; transaction log vols. are treated with higher priority. Users can also provide explicit priorities. Subblock-level dedupe with variable-width chunk ID; can dedupe across volumes; compression ratio: 4-5x for primary data, 10-20x for backup data Besides dedupe compression, uses negotiated TCP optimization parallel-ization Local are auto tiered; cloud are used for fast online restore; cloud clones function like offsite encrypted tape: can be cloned mounted by any Stor- Simple device using the same service account SSDs SAS drives for local primary storage with auto tiering HA; capacity from 10TB to 200TB AES = Advanced Encryption Stard; HA = high availability; HDD = hard-disk drive; SAN = storage area network; SATA = Serial Advanced Technology Attachment; VM = virtual machine Source: Gartner (August 2011) Page 8 of 10 Gartner, Inc. G

9 Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Competitive Lscape: Hybrid Storage Appliances, Gateway to Public Cloud" "Case Study: Reducing the Storage Cost via the Public Cloud" "Cloud Storage Gateways: Bridge the Gap" Gartner, Inc. G Page 9 of 10

10 Regional Headquarters Corporate Headquarters 56 Top Gallant Road Stamford, CT USA European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, ar World Trade Center São Paulo SP BRAZIL Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Gartner, Inc. /or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services its research should not be construed or used as such. Gartner is a public company, its shareholders may include firms funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence integrity of Gartner research, see Guiding Principles on Independence Objectivity on its website, ombudsman/omb_guide2.jsp. Page 10 of 10 Gartner, Inc. G

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

Cloud IaaS: Security Considerations

Cloud IaaS: Security Considerations G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Big data Devices Apps

Big data Devices Apps Trends driving IT pressures Cloud Big data Devices Apps Devices: Info Workers Will Erase Boundary Between enterprise And Consumer Technologies. Forrester Research. August 30, 2012 Apps: Gartner: Predicts

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON

UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON UNDERSTANDING DATA DEDUPLICATION Thomas Rivera SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

Additional Tools for a World-Class ERP Infrastructure

Additional Tools for a World-Class ERP Infrastructure G00219770 Additional Tools for a World-Class ERP Infrastructure Published: 28 October 2011 Analyst(s): Pat Phelan, Derek Prior This research provides a guide to the infrastructure elements that are needed

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed

More information

FAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS

FAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS FAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS Version 1.3 October 2011 1. What are Riverbed Whitewater cloud storage gateways for data protection? Riverbed Whitewater appliances are drop-in cloud

More information

VMware VDR and Cloud Storage: A Winning Backup/DR Combination

VMware VDR and Cloud Storage: A Winning Backup/DR Combination VMware VDR and Cloud Storage: A Winning Backup/DR Combination 7/29/2010 CloudArray, from TwinStrata, and VMware Data Recovery combine to provide simple, fast and secure backup: On-site and Off-site The

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015

Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Cloud OS Vision. Modern platform for the world s apps

Cloud OS Vision. Modern platform for the world s apps Cloud OS Vision Modern platform for the world s apps transforms the datacenter unlocks insights on any data empowers people-centric IT enables modern business apps Development Management Identity Data

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Research Publication Date: 10 August 2011 ID Number: G00213049 Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Jay E. Pultz The National Renewable Energy Laboratory's (NREL's) data center

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

Singapore Empowers Land Transport Planners With Data Warehouse

Singapore Empowers Land Transport Planners With Data Warehouse G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Containers and Modules: Is This the Future of the Data Center?

Containers and Modules: Is This the Future of the Data Center? Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

3 common cloud challenges eradicated with hybrid cloud

3 common cloud challenges eradicated with hybrid cloud 3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

Repurposing Old PCs as Thin Clients as a Way to Save Money

Repurposing Old PCs as Thin Clients as a Way to Save Money Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers

More information

EMC AVAMAR. a reason for Cloud. Deduplication backup software Replication for Disaster Recovery

EMC AVAMAR. a reason for Cloud. Deduplication backup software Replication for Disaster Recovery EMC AVAMAR a reason for Cloud Deduplication backup software Replication for Disaster Recovery Bogdan Stefanescu (Bogs) EMC Data Protection Solutions bogdan.stefanescu@emc.com 1 BUSINESS DRIVERS Increase

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

Symantec NetBackup 7.5 What s New and Version Comparison Matrix Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single

More information

E-Mail Is a Commodity and Other Fairy Tales

E-Mail Is a Commodity and Other Fairy Tales G00210585 E-Mail Is a Commodity and Other Fairy Tales Published: 9 February 2011 Analyst(s): Matthew W. Cain A deep understanding of the operational, architectural, policy and feature requirements of an

More information

Choosing a Replacement for Incumbent One-Time Password Tokens

Choosing a Replacement for Incumbent One-Time Password Tokens Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Efficient Backup with Data Deduplication Which Strategy is Right for You?

Efficient Backup with Data Deduplication Which Strategy is Right for You? Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

Getting Started With Cloud Storage

Getting Started With Cloud Storage Getting Started With Cloud Storage Thinking about making a move to the cloud? Explore this guide to discover the key considerations you need to know before taking the plunge. Cloud Storage Options: Public

More information

Release Notes. Cloud Attached Storage 2.5.32

Release Notes. Cloud Attached Storage 2.5.32 Release Notes Cloud Attached Storage 2.5.32 January 2011 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Data Protection. the data. short retention. event of a disaster. - Different mechanisms, products for backup and restore based on retention and age of

Data Protection. the data. short retention. event of a disaster. - Different mechanisms, products for backup and restore based on retention and age of s t o r s i m p l e D a t a s h e e t Data Protection I/T organizations struggle with the complexity associated with defining an end-to-end architecture and processes for data protection and disaster recovery.

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

Backup and Recovery Redesign with Deduplication

Backup and Recovery Redesign with Deduplication Backup and Recovery Redesign with Deduplication Why the move is on September 9, 2010 1 Major trends driving the transformation of backup environments UNABATED DATA GROWTH Backup = 4 to 30 times production

More information

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge

More information

What to Consider When Designing Next-Generation Data Centers

What to Consider When Designing Next-Generation Data Centers Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

Solution Overview. Business Continuity with ReadyNAS

Solution Overview. Business Continuity with ReadyNAS Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

UniFS A True Global File System

UniFS A True Global File System UniFS A True Global File System Introduction The traditional means to protect file data by making copies, combined with the need to provide access to shared data from multiple locations, has created an

More information

ADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions

ADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions ADVANCED DEDUPLICATION CONCEPTS Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and

More information

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION? WHAT IS FALCONSTOR? FalconStor Optimized Backup and Deduplication is the industry s market-leading virtual tape and LAN-based deduplication solution, unmatched in performance and scalability. With virtual

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE

EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE INTRODUCTION IT organizations today grapple with two critical data storage challenges: the exponential growth of data and an increasing need to keep more data for

More information

Establishing a Strategy for Database Security Is No Longer Optional

Establishing a Strategy for Database Security Is No Longer Optional Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.

UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s. UNDERSTANDING DATA DEDUPLICATION Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual

More information

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN Whitepaper NexentaConnect for VMware Virtual SAN Full Featured File services for Virtual SAN Table of Contents Introduction... 1 Next Generation Storage and Compute... 1 VMware Virtual SAN... 2 Highlights

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Veritas NetBackup With and Within the Cloud: Protection and Performance in a Single Platform

Veritas NetBackup With and Within the Cloud: Protection and Performance in a Single Platform Veritas NetBackup With and Within the Cloud: Protection and Performance in a Single Platform Content Highlights... 3 Cloud-enabled Backup and Recovery... 3 Integrating Veritas NetBackup with the Cloud....

More information

Symantec Backup Exec 2014

Symantec Backup Exec 2014 Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup

More information

Data Center Consolidation: Top 10 Best Practices for Project Success

Data Center Consolidation: Top 10 Best Practices for Project Success Research Publication Date: 2 May 2011 ID Number: G00212551 Data Center Consolidation: Top 10 Best Practices for Project Success David J. Cappuccio Many data center consolidation projects fail to meet overall

More information