Feeds

IBM's storage software owns all of EMC kit

All your arrays belong to us

  • alert
  • submit to reddit

Internet Security Threat Report 2014

IBM has infiltrated deeper into EMC's storage line with a new version of its SAN (storage area network) Volume Controller software.

A number of organs mangled the news around IBM's fifth release of this software, saying this is the first time IBM's code has been able to manage EMC's hardware. Not true. In April, IBM released version 1.2 of the SAN Volume Controller product and was able to tap into all of EMC's Symmetrix boxes but only some of its CLARiiON systems. With the latest software, IBM can now cover the entire CLARiiON line as well, including EMC's relatively new CX700, CX500 and CX300 boxes.

IBM has been quite proud of its ability to manage systems from both EMC and Hitachi. It's a real leader in the heterogeneous storage market, don't ya know.

"IBM's Virtualization Engine Suite for Storage truly disrupts the storage industry by freeing technology and purchasing managers to leverage a multi-vendor disk hardware strategy without suffering many of the traditional management costs associated with heterogeneous storage," said Jens Tiedemann, a GM in IBM's storage software group. "With this announcement, IBM's SAN Volume Controller takes its place as the killer application in the storage industry and as the leading virtualization solution whether measured by performance, scalability or device interoperability."

The SAN Volume Controller software runs either on a low-end Intel-based server or on a Cisco switch. It gives customer a way to manage hardware from various vendors with a single software package and is aimed primarily at block-level tasks. IBM's SAN File System - code-named Storage Tank - performs similar functions for file-level tasks.

The SAN Volume Controller package starts at $60,000. ®

Related stories

Customers pay billions for storage software in Q3
IBM moves the database goalposts
NetApp's storage virtualisation evolves
ADIC pools disk and tape

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
Oracle hires former SAP exec for cloudy push
'We know Larry said cloud was gibberish, and insane, and idiotic, but...'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.