Identify the Right Gateway Product for Storage in the External Cloud
|
|
- Roger Mills
- 8 years ago
- Views:
Transcription
1 G Identify the Right Gateway Product for Storage in the External Cloud Published: 25 August 2011 Analyst(s): Pushan Rinnen, Gene Ruth, Stanley Zaffos This report analyzes the emerging external gateway market profiles some key vendors products for Gartner's user clients. As external offerings become increasingly available, it is important for user clients to know what gateway choices are available when they want to leverage to augment or replace their onpremises storage. Key Findings Gateways for external augment or replace local storage with play an important role in the overall success of external services. These gateways are not yet ready for enterprise-scale data center deployment but can address branch office storage requirements in many cases. The majority of the data that the gateways push to the external cloud today are latencyinsensitive workloads, such as backup, disaster recovery, inactive file data. Many vendors in this space are startups with very limited installed bases. Recommendations Make gateways part of any plan to access, but proceed cautiously due to the nascent nature of the gateway product category. Plan to use multiple public cloud providers to minimize dependence on a single service provider. Create mitigation plans to access cloud data in case the gateway vendors exit the market. Choose gateways that compare well against conventional SAN or NAS disk arrays map workloads that best fit the gateway the cloud.
2 What You Need to Know An external cloud is an IT capability that is offered as a service to a business that is not hosted by the business's IT organization. An external cloud can be public or private, but must be implemented by a third-party service provider. With the emergence of external public services offerings such as Amazon S3 has come a new crop of independent cloud gateway vendors products to help users leverage public. At the same time, some cloud gateways have been developed to augment external private services. These gateways are onpremises appliances that offer an easier-to-manage /or more efficient way to migrate data to an external cloud. Gateway architectures vary by vendor are often tailored to address specific workload types. Some use embedded internal storage as a local cache to boost performance; others focus on local storage tiering with as an extended tier. Some are dedicated for backup data only; some are designed to archive older files to an external cloud; others are more versatile with different use cases. Some focus on supporting multiple public platforms, while others focus more on supporting external or internal private services. The br-new products designed from the ground up tend to have more comprehensive features for the cloud, whereas repositioned products are still weak in their cloud support capabilities. This research doesn't include gateways available only through a specific service offering, as users of that particular services offering would not have the option of choosing a different gateway. Analysis Market Technology Definitions Segmentation Gartner defines an external cloud as an IT capability that is offered as a service to a business that is not hosted by the business's own IT organization. An external cloud can be public or private, but must be implemented by a third-party service provider. All public clouds are external, but a private cloud can be internal or external. This research focuses on gateways that bridge to external. Gartner defines public as a storage utility offering owned by a public cloud service provider that uses the pay-per-use model software-agnostic, reservationless provisioning. Examples include Amazon S3, Microsoft Windows Azure Storage Nirvanix. External private is defined as a storage utility offering owned by an external private cloud service provider whose storage services are subscribed to by a select group of organizations not just any consumer. Examples include some regional telecom providers managed service providers. The external gateway market includes a new set of products that function as onpremises gateways (hardware or software appliances) to. They connect to external via Internet APIs or protocols such as REST or HTTP. They support local servers or clients via stard storage access protocols such as Internet Small Computer System Interface (iscsi), Network File System (NFS) Common Internet File System (CIFS). Architecturally, they can be segmented into the following three models: Page 2 of 10 Gartner, Inc. G
3 Cache devices The gateway provides advanced caching algorithms to mask performance limitations associated with. Examples of this type of gateway include Nasuni, Riverbed Whitewater, TwinStrata. All of these focus on leveraging public. Tiered devices The gateway provides on-premises storage tiers such as solid-state drives (SSDs) disk drives, as well as cloud tiers that reside at service providers. Two distinct product types exist within this category. One has integrated local storage tiers, such as StorSimple, which was designed from the ground up for leveraging public. The other is repositioned file virtualization devices that can migrate or tier data among other onpremises storage arrays the cloud. Examples include EMC's Cloud Tiering Appliance F5 Networks' ARX Cloud Extender, both of which do not store user data on the appliances. Copy/synchronization devices The gateway provides remote replication synchronization services among the same devices deployed at different sites (both user premises external private cloud providers' sites), similar to those offered by conventional storage arrays for an internal cloud. Examples include CTERA Networks Panzura. Gartner also calls those gateways with embedded local primary storage "hybrid storage appliances," which are designed to serve limited local primary storage for the most active data, while pushing relatively inactive data to the public cloud via an embedded gateway that connects to the seamlessly. To the users hosts, it behaves as a normal storage system. The term "hybrid" is used to describe the attribute of combining local storage. From a data flow perspective, it is a storage target or an in-b appliance that intercepts all input/outputs (I/Os) to from a virtual volume or file system. From a storage system perspective, it uses sophisticated cache management algorithms to minimize data flows to from the public cloud by satisfying as many I/Os as possible from local storage. Data is often compressed or deduplicated in the appliance to increase its effective cache capacity, when data is actually transferred to or from the cloud; WAN-optimized controller (WOC) techniques are often used to reduce the impact of link latency on performance. Examples of hybrid storage appliances include CTERA, Nasuni, Panzura, StorSimple TwinStrata. Introduction External gateways are a nascent phenomenon, because external services are still in the early stage of development. A viable offering of external cloud gateway appliances didn't really emerge until Nevertheless, as long as external remains a viable alternative to customers' internal storage deployment, we expect those gateway products will continue to have their value, such as boosting performance, increasing storage efficiency simplifying management. Gartner expects the gateway market to exp, enable accelerate the acceptance of external. Market Analysis External gateways are peripherals to external services. The gateways' future, therefore, is very much dependent on the success of overall external services, as well as on reliable products from solid vendors. For enterprise customers, gateways are an Gartner, Inc. G Page 3 of 10
4 essential component of solution, as they can help overcome some key issues associated with external such as performance. While public offers potential cost agility advantages, which fit the need for consumers ad hoc projects such as test development, they may frequently suffer from lower security, weaker SLAs, looser integration with on-site applications, lower reliability. The lack of transparency in storage architecture data protection schemes deployed by some major public service providers does not help generate confidence among business customers who want to develop tighter deeper long-term relationships. In contrast, external private clouds tend to have higher-cost storage infrastructure because they often acquire commercial storage systems instead of building their own infrastructure. However, their strengths may include stronger SLAs, deeper integration with on-site applications higher levels of reliability security can often justify the higher cost. Because they deploy commercial products, whose features functions are more readily available, business customers with internal storage know-how may feel more comfortable about leveraging external to gain the benefits of agility, such as global data accessibility, without internal private infrastructure, outsourced management of backup disaster recovery, potentially lower total cost of ownership. Overall, all hybrid storage appliances those gateways with internal storage for local cache or primary storage can offer predictable performance operations for local users, in some cases, can replace on-premises disk arrays. However, some gateways are designed to alleviate some of the pain points associated with using public specifically. For example, support of simultaneous access to more than one public cloud, cloud clones, encryption of data in flight at rest will increase the data availability, recoverability security in the public cloud. These gateways are typically offered by startups. Other gateways are created by vendors that want to use the gateway as a facilitator to increase their storage platform sales to the external private cloud service providers. For example, EMC's F5's appliances have been around for many years to provide user-transparent file migration among different local tiers of storage have recently been retrofitted with access protocols such as REST. They lack some cloud-focused features such as deduplication, WAN optimization cloud cloning. They may or may not be able to preserve the native deduplication on the local storage systems when they move data to the cloud. Key Vendors Products in the Market Although we segment external gateway devices into three architectural categories based on some key attributes, every single one is designed somewhat differently. Those designed from the ground up for public are typically from startups, including Nasuni, StorSimple TwinStrata; whereas startups CTERA Panzura focus more on providing infrastructure technologies for hybrid cloud private cloud service providers. Established vendors such as EMC Hitachi aim to protect their own turf by offering gateways to augment their respective cloud infrastructure storage platforms Atmos Hitachi Content Platform (HCP). Riverbed is leveraging its WAN optimization know-how to enter a new market. Table 1 groups the vendors products by the three categories lists some of the key feature functions as a reference for users who plan to adopt external. Page 4 of 10 Gartner, Inc. G
5 Table 1. External Cloud Gateways Comparison, 2011 Company/ Product Cloud Services APIs OS/Apps Supported Encryption Policy to the Cloud Architecture Client- Side Protocols Dedup-lication/ Compres-sion WAN Optimi-zation Snapshots/ Cloning in the Cloud Gateway Storage Details CTERA/ Cloud Attached Storage Cloud Portal Copy/ synch Hybrid that supports CTERA Portal, which can further connect to public CIFS, NFS, iscsi Microsoft Exchange, SQL, Active Directory SharePoint AES-256 encryption, SHA-1 fingerprint File metadata-based policy Block-level dedupe, which can be applied across multiple appliances/ sites; compression ratio between 2x 20x Leverage dedupe; only change delta sent to the cloud Snapshots can be stored both locally in the cloud; portal storage nodes can be cloned for HA 2-8 SATA drives, delivering thinprovi-sioned storage for data metadata Panzura Copy/ synch Hybrid (REST or SOAP Rsync over SSH, NFS), which can further connect to public etc. NFS/ CIFS, iscsi or MS SQL API, VTL/ NDMP to interface tape or disk backup software MS Share- Point SQL; Symantec NetBackup or backup scripts Yes (RSA-2048 AES-256 Replication policies between nodes or between a node one or more public cloud provider; can go down to directory-level granularity Live, local or global block dedupe dictionary part of metadata; compres-sion ratio: up to 95% Only the data change delta is exchanged across controllers; where possible, multiple TCP sessions are used in parallel to reduce the latency effects. Policybased at directory level; cloning is at directory or file level; metadata are sent to all controllers for synchronization; data are mountable from multiple locations. HDDs (8TB 24TB) or SSDs or both; RAID 10 Gartner, Inc. G Page 5 of 10
6 Hitachi/ HDI Cache Private cloud based on Hitachi Content Platform CIFS, NFS CIFS/NFS files No (HCP offers encryption for data at rest) All copied to cloud No (HCP in the cloud has single instance store compression) Yes (via partnership with Silver Peak) No local or SAN attached; store cloud replicated files cloud archived stubs Nasuni/ Filer Cache Public, such as Amazon S3, EMC Atmos, Microsoft Windows Azure Storage, Nirvanix, Rackspace, etc. CIFS NFS Any that work with CIFS/ NFS On-premises encryption with OpenPGP/ AES-256 Can set cache size, schedule the frequency retention periods of (unlimited), volume quotas Subfile based dedupe; average 30% (up to 90%) space savings Only change delta at subfile level between snapshot intervals is sent to the cloud after being compressed File system snapshot hourly by default sent to the cloud; customer can restore to any point in the life of a file, directory or file system. Software installed on a virtual server, emulating Windows file server; caches both data metadata with local storage attached to the virtual server; can also cache. Riverbed/ Whitewater Cache Public such as Amazon S3 EMC Atmos, etc. CIFS, NFS Backup target for NetBackup, Backup Exec, TSM, NetWorker, Vizioncore CA ARCserve User existing solution Use thirdparty backup software policy Subblock granular (to 16 bytes) dedupe; can be applied across volumes; patented algorithm used by Steelhead; compression ratio: 20-30x Transactionally aware, parallel cloud object store: reduce latency for REST API No not used for primary data Unified RAM HDD cache (7TB or 11TB raw); RAID 6 Page 6 of 10 Gartner, Inc. G
7 TwinStrata Cache Public, such as Amazon S3, as well as cloud storage based on EMC AtmosScality Ring, MezeoCloud, etc. iscsi All apps collaboration (Exchange, VMware), backup/dr (Backup Exec, CA ARCserve) Yes (AES-256) Can set policy on local cache cloud provider parameters No dedupe; Gzip compatible No In-cloud triggered by users Cloud volume is partially cached locally; cloud replica is 100% cached locally via async replication. Dynamic adaptive caching EMC/ Cloud Tiering Appliance Tiered CIFS, NFS CIFS/NFS files No Public or private based on EMC Atmos Schedulable migration policy Compressed files stay compressed in different tiers No No, cannot send local to the cloud Appli-ances do not store or cache data, but store metadata; can run on VMs F5/ARX Cloud Extender Tiered CIFS CIFS files Yes (AES-256) Public or private based on EMC Atmos, NetApp StorageGRID Schedulable migration policy No (deduped files will be hydrated before sending to the cloud) No No, cannot send local to the cloud Software runs on a Windows file server, with local storage caching metadata for files sent to the cloud; supports virtual server HA or physical server clustering Gartner, Inc. G Page 7 of 10
8 StorSimple Tiered Public such as Amazon S3 Windows Azure based on EMC Atmos iscsi VMware 3.5/4.0/4.1, Hyper-V, Windows Server 2008 R2 User existing encryption solution or StorSimple's encryption with AES-256 Automatically moves data across SSD, SAS cloud tiers based on access frequency age; transaction log vols. are treated with higher priority. Users can also provide explicit priorities. Subblock-level dedupe with variable-width chunk ID; can dedupe across volumes; compression ratio: 4-5x for primary data, 10-20x for backup data Besides dedupe compression, uses negotiated TCP optimization parallel-ization Local are auto tiered; cloud are used for fast online restore; cloud clones function like offsite encrypted tape: can be cloned mounted by any Stor- Simple device using the same service account SSDs SAS drives for local primary storage with auto tiering HA; capacity from 10TB to 200TB AES = Advanced Encryption Stard; HA = high availability; HDD = hard-disk drive; SAN = storage area network; SATA = Serial Advanced Technology Attachment; VM = virtual machine Source: Gartner (August 2011) Page 8 of 10 Gartner, Inc. G
9 Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Competitive Lscape: Hybrid Storage Appliances, Gateway to Public Cloud" "Case Study: Reducing the Storage Cost via the Public Cloud" "Cloud Storage Gateways: Bridge the Gap" Gartner, Inc. G Page 9 of 10
10 Regional Headquarters Corporate Headquarters 56 Top Gallant Road Stamford, CT USA European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, ar World Trade Center São Paulo SP BRAZIL Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Gartner, Inc. /or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services its research should not be construed or used as such. Gartner is a public company, its shareholders may include firms funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence integrity of Gartner research, see Guiding Principles on Independence Objectivity on its website, ombudsman/omb_guide2.jsp. Page 10 of 10 Gartner, Inc. G
Use Heterogeneous Storage Virtualization as a Bridge to the Cloud
G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies
More informationPrivate Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
More informationCloud E-Mail Decision-Making Criteria for Educational Organizations
Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between
More informationQ&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
More informationIron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
More informationThe Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
More informationModify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
More informationBackup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
More informationCloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
More informationCloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
More informationResearch. Key Issues for Software as a Service, 2009
Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS
More informationMicrosoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
More informationTactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
More informationKey Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
More informationFor cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
More informationWhen to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
More informationBig data Devices Apps
Trends driving IT pressures Cloud Big data Devices Apps Devices: Info Workers Will Erase Boundary Between enterprise And Consumer Technologies. Forrester Research. August 30, 2012 Apps: Gartner: Predicts
More informationIT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
More informationClients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
More informationResearch Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
More informationCost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
More informationAdditional Tools for a World-Class ERP Infrastructure
G00219770 Additional Tools for a World-Class ERP Infrastructure Published: 28 October 2011 Analyst(s): Pat Phelan, Derek Prior This research provides a guide to the infrastructure elements that are needed
More informationFAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS
FAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS Version 1.3 October 2011 1. What are Riverbed Whitewater cloud storage gateways for data protection? Riverbed Whitewater appliances are drop-in cloud
More informationManaging IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
More informationEmerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
More informationCase Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing
Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed
More informationUNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON
UNDERSTANDING DATA DEDUPLICATION Thomas Rivera SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationData in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
More informationCloud OS Vision. Modern platform for the world s apps
Cloud OS Vision Modern platform for the world s apps transforms the datacenter unlocks insights on any data empowers people-centric IT enables modern business apps Development Management Identity Data
More informationIntegrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
More informationVMware VDR and Cloud Storage: A Winning Backup/DR Combination
VMware VDR and Cloud Storage: A Winning Backup/DR Combination 7/29/2010 CloudArray, from TwinStrata, and VMware Data Recovery combine to provide simple, fast and secure backup: On-site and Off-site The
More informationVendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
More informationEight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
More informationHow To Create A Cloud Computing System
G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus
More informationIT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
More informationKey Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
More informationData Center Redesign Yields an 80%-Plus Reduction in Energy Usage
Research Publication Date: 10 August 2011 ID Number: G00213049 Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Jay E. Pultz The National Renewable Energy Laboratory's (NREL's) data center
More informationBest Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
More informationCost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?
Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing
More informationToolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
More informationContainers and Modules: Is This the Future of the Data Center?
Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet
More informationThe What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
More informationCase Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
More informationThe Lack of a CRM Strategy Will Hinder Health Insurer Growth
Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey
More informationResearch. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
More informationData Center Consolidation Projects: Benefits and Pitfalls
Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation
More informationUNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard
UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationBlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything
BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest
More informationBEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
More informationSingapore Empowers Land Transport Planners With Data Warehouse
G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and
More informationDeliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
More informationRepurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
More informationThe Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
More informationEMC AVAMAR. a reason for Cloud. Deduplication backup software Replication for Disaster Recovery
EMC AVAMAR a reason for Cloud Deduplication backup software Replication for Disaster Recovery Bogdan Stefanescu (Bogs) EMC Data Protection Solutions bogdan.stefanescu@emc.com 1 BUSINESS DRIVERS Increase
More informationX.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
More informationChoosing a Replacement for Incumbent One-Time Password Tokens
Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements
More informationE-Mail Is a Commodity and Other Fairy Tales
G00210585 E-Mail Is a Commodity and Other Fairy Tales Published: 9 February 2011 Analyst(s): Matthew W. Cain A deep understanding of the operational, architectural, policy and feature requirements of an
More informationThe Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
More information3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
More informationEfficient Backup with Data Deduplication Which Strategy is Right for You?
Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?
More informationCloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with
More informationCase Study: A K-12 Portal Project at the Miami-Dade County Public Schools
Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school
More informationIn the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
More informationDiscovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
More informationQ&A: How Can ERP Recurring Costs Be Contained?
Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial
More informationSymantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
More informationThe Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
More informationEstablishing a Strategy for Database Security Is No Longer Optional
Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very
More informationBackup and Recovery Redesign with Deduplication
Backup and Recovery Redesign with Deduplication Why the move is on September 9, 2010 1 Major trends driving the transformation of backup environments UNABATED DATA GROWTH Backup = 4 to 30 times production
More informationNow Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
More informationThe IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
More informationDell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell
Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge
More informationAgenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
More informationWe look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
More informationOvercoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
More informationData Protection. the data. short retention. event of a disaster. - Different mechanisms, products for backup and restore based on retention and age of
s t o r s i m p l e D a t a s h e e t Data Protection I/T organizations struggle with the complexity associated with defining an end-to-end architecture and processes for data protection and disaster recovery.
More informationOrganizations Should Implement Web Application Security Scanning
Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities
More informationADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions
ADVANCED DEDUPLICATION CONCEPTS Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and
More informationDutch University's Successful Enterprise System Implementation Yields Valuable Lessons
Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented
More informationPredicts 2008: The Market for Servers and Operating Systems Continues to Evolve
Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,
More informationGoogle and Microsoft Battle for the.edu E-Mail Market
Research Publication Date: 16 August 2007 ID Number: G00150690 Google and Microsoft Battle for the.edu E-Mail Market Matthew W. Cain, Marti Harris This document compares the current no-fee e-mail programs
More informationBusiness Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
More informationHow Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
More informationGetting Started With Cloud Storage
Getting Started With Cloud Storage Thinking about making a move to the cloud? Explore this guide to discover the key considerations you need to know before taking the plunge. Cloud Storage Options: Public
More informationSolution Overview. Business Continuity with ReadyNAS
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
More informationWHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?
WHAT IS FALCONSTOR? FalconStor Optimized Backup and Deduplication is the industry s market-leading virtual tape and LAN-based deduplication solution, unmatched in performance and scalability. With virtual
More information2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
More informationWhat to Consider When Designing Next-Generation Data Centers
Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,
More informationResponsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
More informationRelease Notes. Cloud Attached Storage 2.5.32
Release Notes Cloud Attached Storage 2.5.32 January 2011 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationUniFS A True Global File System
UniFS A True Global File System Introduction The traditional means to protect file data by making copies, combined with the need to provide access to shared data from multiple locations, has created an
More informationGartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
More informationOrganizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
More informationMicrosoft and Google Jostle Over Cloud-Based E-Mail and Collaboration
Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering
More informationIAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
More informationIT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
More informationEMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE
EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE INTRODUCTION IT organizations today grapple with two critical data storage challenges: the exponential growth of data and an increasing need to keep more data for
More informationSteelFusion with AWS Hybrid Cloud Storage
Solution Guide SteelFusion with AWS Hybrid Cloud Storage March 2016 The Challenge According to IDC, to meet the demands of global customer and global talent requirements, companies have to maintain remote
More informationRoundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
More information