Feeds

HP 3PAR kit wins X-Factor for mid-range storage arrays

Analyst hoiks out 'top 50 arrays' list

Security for virtualized datacentres

Mirror, mirror on the wall, which is the fairest mid-range array of them all? Why, the 3PAR 7400, says enterprise data storage analyst DCIG.

The outfit rates storage gear in various categories, like enterprise midrange arrays and backup appliances. It updates its reports roughly once a year and is quite successful in getting winning product suppliers to sponsor the distribution of its reports.

DCIG says that vendors do not pay for or influence their ratings in the report in any way, shape or form. You can down the full report here (84-page PDF).

There were 50 array products evaluated by DCIG and the snapshot results look like this:

  • HP 3PAR StoreServ 7400 - best-in-class
  • EMC VNX 7500 - recommended
  • VNX5700 - recommended
  • HDS HUS 150 - recommended
  • HUS VM - recommended
  • NetApp FAS3250 - recommended

The report's ratings then go through Excellent, Good and Basic. HP's StoreVirtual 4730 is in the Excellent category, number 13 overall. The EVA P6550 is in the Good category, 28th overall, just above IBM's XIV Gen 3 array.

HP's StoreEasy 5000 was second from the bottom (49th out of 50) and in the Basic category. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.