Feeds

Data Domain sends de-duped files into unalterable state

Mommy, Wow! Feds are happy now

Securing Web Applications Made Simple and Scalable

Data Domain is teaching its de-duplication boxes a new storage retention trick to satisfy those picky government regulatory-types when they come sniffing the machinery.

It's adding a Storage Lock option to all its de-duplication systems. The software lets administrators keep de-duplicated files in an unalterable state for fixed periods of times.

That's essentially WORM (write once, read many) for de-duplicated archive storage. And it's another push by the vendor to move beyond vanilla backup solutions to more exotic storage tiers such as — ooh — nearline storage.

Data Domain reckons its the first software to allow file locking for IT regulatory mandates using high throughput inline deduplication.

Retention Lock can bolt down data on a per-file basis, with adjustable limits for how long it's kept under key. During that period, users can't change or delete the files — but admins still can move them about and change the data's security and retention settings.

That's good news if security requirements or policies up and change on a customer, or if some files must be deleted (under court order, of course).

The lock can be applied to any file on Data Domain's boxes regardless of the application or data tier they come from. Locked files can also be replicated for disaster recovery.

Retention Lock works on current archiving tools from EMC, CommVault, Symantec, AXS-One and DataGlobal.

The software is available now to customers running Data Domain OS 4.5. Pricing starts at $500 for its branch-office DD120 de-dupe appliance, and $24,000 for its enterprise DD690g box. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.