Feeds

Sepaton's virtualisation surge

Cloud, storage pooling and multi-tenancy

7 Elements of Radically Simple OS Migration

With its latest software release Sepaton is providing virtual ES2 arrays to departments in private clouds and customers in public clouds. It also has a roadmap to turn its grid-architecture high-end ES2 deduplicating secondary storage array engines into virtual machine appliances.

The ES2 is a secondary storage system based on a grid of engine nodes and connected back-end storage based on Dot Hill and LSI Engenio enclosures and, recently, Hitachi Data Systems AMS arrays. It started out as a virtual tape system, with a content-awareness of the data being backed up, and is now becoming a generalised secondary storage system with thin provisioning, multiple interfaces and abstraction layers.

Version 5.4 of its software adds the notion of storage pools, which are logical ES2 arrays in their own right and to which compute resource and storage policies can be dynamically applied. For example, deduplication can be applied across all storage pools for maximum storage efficiency on a specific per-pool basis if a stringent security policy is applied that requires data in separate pools to be isolated.

A load balancer can be used to apportion ES2 storage engine resource to the pools so that service level agreements can be met. Pools can also have their own policies for replication, backup runs and backup application; if customers need a separate NetBackup pool they can have one. The pools can be delineated by disk type as well, say one for Dot Hill and another for AMS storage, with different tiers of disk storage for different customers, environments and applications. All new ES2 arrays come with AMS storage but the existing storage is fully supported by the new software.

In the future Sepaton intends to deliver WORM (Write Once, Read Many) and encryption capabilities on a per-pool basis.

There has been an increase in the set of backup applications supported and they include NetBackup, with support for OST hopefully expected next month when certification commences, TSM, NetWorker and HP Data Protector. Data can be securely erased with a full audit trail to meet data deletion compliance requirements. Replication can now be paused, resumed and checkpointed.

Sepaton has introduced ContentAware DataAnalytics so that sysadmins can look at details of MySQL backups, Windows files, Oracle files and others. Ingest loads can be compared and resources balanced to meet demand by backup app, content type, time of day, week, month etc. The data can be used as the basis for charge-back or customer billing. Trend charts can be produced to that ES2 admin staff know what's going on in their array and what is liable to happen in the future.

Looking ahead COO Fidelma Russo said Sepaton is adding 64bit deduplication, 8Gbit/s Fibre Channel, and support for Fibre Channel Over Ethernet, NFS access, and iSCSI, using 10GbitE. These should arrive in the second half of this year. In the first half of 2011 we should see the availability of the ES2 software as a packaged virtual machine (VM) appliance. It could be deployed in blade servers, giving customers the ability to dynamically ramp the amount of compute resource up and down by switching VMs on and off.

The company has previously mentioned adding eDiscovery capabilities.

The second half of 2011 should see the capability of having the link to the back-end storage virtualised so that it could be a local array in the data centre or a cloud storage capability allowing for enormous capacity in the cloud, or the fastest performance through having local arrays, with on-demand allocation of capacity resource as well as compute resource.

Sepaton is surging ahead to a future in which data centres are virtualised and deliver services in a private or public cloud environment or both. Its customers are enterprises delivering private clouds, managed service providers with public clouds and a combination of the two. It aims to provide "complete data lifecycle protection management" in the cloud to them, using a fully virtualised secondary storage array resource.

Existing customers get the new 5.4 software as part of their support agreement. ®

Best practices for enterprise data

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Microsoft says 'weird things' can happen during Windows Server 2003 migrations
Fix coming for bug that makes Kerberos croak when you run two domain controllers
Cisco says network virtualisation won't pay off everywhere
Another sign of strain in the Borg/VMware relationship?
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?