Feeds

Nasuni grabs cloud development cash

Following the money into the clouds

Internet Security Threat Report 2014

Probably the last storage venture capital cash raising exercise of 2010 is following the dash to the cloud by pumping $15m into cloud filer startup Nasuni.

Nasuni received $8m in a previous funding round in March 2009, so it has now received a total of $23m for the development of its business and software appliance: a lot of money for a software-only company in quite a short time period.

The software comes as a virtual machine, supporting VMware, Citrix and Hyper-V, and sends encrypted and deduplicated file data to a cloud storage service such as Amazon's S3, Azure, Iron Mountain, Nirvanix, Peer 1 Hosting and others. This cloud storage shows up on user's local systems as a networked drive.

There is a local 500GB cache where retrieved data from the cloud is decrypted and re-hydrated. Nasuni says its cloud filer gateway makes the storage of primary file data in the cloud feasible.

Twenty-three million dollars is a lot of money for software development and probably buys a lot of partner business infrastructure development too. The whole cloud gateway area is a seething hotbed of development as BridgeSTOR, Cirtas, Nasuni, Riverbed, StorSimple and others build interface appliances, both hardware and software, to represent cloud storage as local storage to users, and provide accelerated and secure transmission of data to and from cloud storage service suppliers. The race is on to build out a cloud storage access infrastructure faster and better than anybody else.

El Reg wonders if cloud storage service suppliers will start supplying their own branded front end devices and so attempt to capture users and prevent them going to other storage service providers. Another possibility is that separate storage virtualisation products, such as IBM's SAN Volume Controller, Hitachi Data Systems USP-V and NetApp's V-Series could have functionality added to enable them to virtualise both networked storage in the data centre and networked storage out in the cloud and present it as a single virtual pool or file name space.

Cloud storage gateways look to be the hottest storage technology going from the venture capitalists' point of view. It's a pound to a penny that the major storage suppliers will end up building their own software and hardware to compete for business here or buy one of the startups in another round of storage consolidation. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.