Feeds

Seagate builds cloud on-ramp for ISVs

Data protection is a cirrus business

Beginner's guide to SSL certificates

Seagate has added a smooth on-ramp to its i365 cloud by offering an API and connector service to ISVs like CA and C2C.

Typically, Seagate's own on-premises EVault product would suck up data from a customer's servers and storage and whiz it up to the i365 cloud storage vault-in-the-sky. Now Seagate has, in effect, extracted APIs and a service connector from i365/EVault and made it available to independent software vendors (ISVs) wanting to extend their data protection out and up into the cloud.

The ISVs bolt the so-called EVault Cloud-Connected Services Platform onto the backend of their existing applications and, hey presto, they enter into recurring customer service revenue nirvana and make i365 a deal of money too. That's the way EVault sees it anyway.

EVault cloud APIs enable an ISV to integrate its on-premises application with the i365 Cloud through a service connector. This resides on-premises - think SW appliance style - caching data and then sending it cloudwards using deduplication, compression, and bandwidth management techniques to reduce bandwidth usage and the cloud storage space used.

A set of Web services RESTful APIs enable account provisioning, metering and billing.

C2C is adding i365 cloud storage to its ArchiveOne product and CA is connecting ARCserve Backup to the i365 cloud as well. Seagate will be hoping that any and every non-cloud service-aligned backup and protection vendor will do the same thing and thus, through ISV channels, greatly expand its effective i365 cloud channel. We can imagine how ISVS like C2C and CA and others could share the recurring revenue from this with their channel members, giving them the incentive to sell it to their small and medium enterprise customers.

This is a pretty neat strategy and helps give Seagate a counter to the white box sales strategies of suppliers like Spare Backup, who are doing deals with IT retailers like Carphone Warehouse and Comet. It also gives Seagate i365 cloud sales channel bandwidth to counter the strong end-user brand image of suppliers such as EMC's Mozy and Symantec, which is offering its own cloud backup service. ®

Beginner's guide to SSL certificates

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.