Feeds

Buyer's Guide de-hassling flash array purchase

DCIG strikes again

3 Big data security analytics techniques

Storage buying guides publisher DCIG has cast its beady eye across flash arrays and come up with the best of the bunch, not quite so good but still Recommended flashy boxes, and plain old Excellent, less plain Good and then the Basic category of suppliers.

DCIG specialises in publishing storage buyers' guides, using published suppliers' information to fill a questionnaire and creating a weighted ranking of the suppliers' info which is then added up to create an overall score. It's done this for backup appliances, deduplication appliances, and virtual server backup software.

DCIG Flash Array Buyers Guide

Now it's turned its attention to all-flash arrays and had a look at boxes from Astute, GreenBytes, Huawei, IBM's Texas Memory Systems, Kaminario, Nimbus, Violin and Whiptail.

Somewhat surprisingly it doesn't look at performance, and cost, saying;

- Performance will vary according to data centre environment, the data being stored and implementation decisions
- most arrays support multiple RAID options that affect both storage capacity and throughput
- [There are] too many products to try to test to produce a Buyer’s Guide in a timely manner.

In summary:

DCIG recognizes that features like price and performance are relevant and even key considerations when buying a flash memory storage array. However it is also almost impossible for a third party like DCIG to objectively measure these features on a large scale. Therefore testing is a part of the buying process that that DCIG believes is still best left to end users.

This guide is only a start then, like help in creating an initial shortlist.

The headline results are:-

- Best in class - Tegile Zebi HA2800
- Recommended - four systems with the leader being PureStorage's FA 320, then the Nimbus S Class S1006M, E Class E6400M + R2000X, and S Class S505M
- Excellent - seven systems ranked with the Nimbus S Class S255M in front, followed by the E Class E6400M + E1000X, PureStorage's FA 310, then Violin Memory's 6232, 6212, and 6616, with the GreenBytes IO Offload Engine (5,000 VDI model) bringing up the rear
- Good - fourteen systems from Violin Memory, Huawei and Whiptail
- Basic - eight systems from Huawei, Astute Networks, Kaminario and Texas Memory Systems.

You can get a copy of the Flash Memory Storage array Buyer's Guide here after a name and e-mail address-type registration process. Check it out and see if its criteria and weightings are what you would use but, but, BUT, you do need to run your own evaluations on price and performance. Trust what the various suppliers say but, as Ronald Reagan said, verify.

After all, would you buy a car without a test drive? ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.