Feeds

EMC and NetApp on a roll

Storage pure plays kicking ass

Securing Web Applications Made Simple and Scalable

Pure play storage suppliers EMC and NetApp are outpacing the server and storage system players Dell, HP and IBM, with Compellent, 3PAR, Storwize and XIV the main catch-up bets for the three followers.

Dell bought Compellent to expand its enterprise storage business in roughly the same way that HP bought 3PAR. We can fit IBM's purchase of XIV and Storwize into the same mould.

Stifel Nicolaus analyst Aaron Rakers has been tracking these five storage suppliers and says he sees a bifurcation happening. EMC and Netapp, the two pure play storage companies (meaning they don't sell servers, essentially), are outpacing Dell, HP and IBM by gaining market share based on revenue. He has produced a chart that shows this:

EMC and NetApp leaving Dell, HP and IBM behind

Storage supplier market share bifurcation (Stifel Nicolaus)

The bifurcation started becoming apparent in 2007 and has continued since then, with the gap steadily widening. In the latest quarter on his chart the gap has widened again, indicating that the three following suppliers - Dell, HP and IBM - have their work cut out if they are to regain their lost market share.

A second chart has NetApp growing its storage market share far higher than any other supplier, including EMC:-

Storage supplier growth rates

Storage supplier growth rates (Stifel Nicolaus)

NetApp has had a growth rate advantage since 2009. It has a long way to go to catch up with EMC in storage revenue market share terms though, as EMC has around 45 per cent compared to NetApp's 18 per cent. On this chart EMC, Hitachi Data Systems, and IBM are all doing better than HP and Dell.

If both IBM's Storwize and XIV strategies, and EMC's VNX strategy pays off, either or both could equal and perhaps overtake NetApp. Hitachi Data Systems is also in this category as NetApp's year-on-year growth rate is continuing down, paralleling HP and Dell. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.