Feeds

ExaGrid scoops the dedupe pool

Surprise best-in-class winner

Application security programs and practises

Who's the mid-range deduplication boss? ExaGrid is, beating Data Domain and Quantum appliances in a survey ranking 37 dedupe appliances.

ExaGrid's EX1300E has scooped the mid-range dedupe pool, being named Best-in-Class in a DCIG survey comparing appliances priced between $20,000 – $100,000, and beating Data Domain and Quantum.

DCIG's 2011 Midrange Deduplication Appliance Buyer's Guide (62-page PDF) ranks the appliances as Best-in-Class, Recommended, Excellent, Good, and Basic, based on suppliers' publicity material, a 70-question survey, an interview, user input, and DCIG staff weightings of the input data.

The input data referred to deduplication management, hardware, scalability and technical support.

The report has been effectively bought by ExaGrid and made publicly available. DCIG says that, although it has paid relationships with some of the suppliers mentioned, none of them paid for entry in the report or for any influence whatsoever in its preparation and production by DCIG.

ExaGrid says its evaluated products were rated as “Excellent” for hardware specifically, and “Recommended” in general.

Comparing deduplication market leader Data Domain and ExaGrid, the report says:

The EMC Data Domain and ExaGrid midrange deduplication appliances were neck-and-neck in terms of functionality in many respects. However the primary reasons as to why the ExaGrid models ended up in the Top 3 and the ExaGrid EX13000E achieved the “Best-in-Class” ranking included:
  • Optional software licenses at no additional charge

  • Its scale-out architecture enables organizations to scale performance linearly and add capacity in modular increments while minimizing the need to replace existing nodes
  • It scaled to offer a higher raw storage capacity than other models with this ranking

El Reg is not going to blow ExaGrid's trumpet any more here. The DCIG report looks at each of the 37 products in detail so you can see how each rates according to your own criteria and pick the right one for your needs. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.