Feeds

Instant storage cloud: just add Atmos

DIY self-service approach

SANS - Survey on application security programs

EMC has added a self-service capability to Atmos so that service providers can add a cloud storage offering to their services – because they don't have to write their own user-metering modules.

EMC says that its Atmos Cloud Delivery Platform (ACDP) has end-user identity provisioning along with reporting on bandwidth and storage resource consumption – the metering module – which delivers reporting by tenants and enables chargeback for private clouds and and billing for public clouds. Service providers and businesses can use their existing customer or user-facing portals and hook these up to the ACDP or use a portal that's included in the ACDP.

The idea is that service providers can buy Atmos storage hardware and the ACDP and start offering cloud storage services to their customers in a matter of days instead of weeks or months. EMC says they could offer archiving to the cloud, backup and shared storage services. Private cloud storage-as-a-service would be a trickier proposition, as business units don't generally want to pay for storage services from their head organisation's data centre on their own. There may be some instances of it happening though.

The Atmos hardware platform has been enhanced with better multi-tenancy services, according to EMC. It already offers multi-tenancy services via tenant and sub-tenant separation of data and administration and EMC is adding "network separation of tenants", saying it "improves security and operational efficiencies for service providers and enterprises supporting multiple applications, departments and customers in a single, shared cloud infrastructure."

EMC partner MTI will be offering on-premise and off-premise services for storage, archiving and tape cloning, based on the ACDP. Redstor will also use the platform to build out its cloud storage offering.

There is a set of new consulting services around the ACDP. The ACDP and the enhanced Atmos storage product are available worldwide now. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.