EMC adds IP to Symmetrix

EMC has announced enhancements to its high-end Symmetrix 8000 series arrays, including native Gigabit Ethernet connectivity for...

This Article Covers

Data centre

EMC has announced enhancements to its high-end Symmetrix 8000 series arrays, including native Gigabit Ethernet connectivity for remote replication, mainframe support and the addition of 146GByte drives that give customers more usable disc space.

Using EMC's Symmetrix Remote Data Facility software, the Symmetrix 8000 series arrays can now replicate data asynchronously over long distances using IP networks. That function previously required a channel extender.

EMC has also introduced the Symmetrix z8000, a preconfigured array that offers Fiber Connectivity (FICON), a high-speed I/O interface for mainframe computer connections and Enterprise Systems Connection (ESCON), an interface for IBM S/390 computers.

Barry Burke, director of integrated solutions for networked storage platforms at EMC, said ESCON and FICON support have been available separately for 10 months on the 8000 series, but they will be more easily incorporated in the pre-packaged systems.

"Today's announcement underscores EMC's commitment to the mainframe market by offering the broadest range of solutions - from the Symmetrix z8000 series to the highest-end Symmetrix DMX systems," David Donatelli, EMC's executive vice-president of storage platforms operations said.

The Symmetrix z8000 series includes two models: the Symmetrix z8530, which is available in 2.0TByte and 3.5TByte configurations; and the Symmetrix z8830, which is available in 5TByte and 10TByte configurations. A Symmetrix z8830 system can scale to more than 27.2TByte of fully protected storage capacity, up to 16 FICON or 32 ESCON connectivity ports and up to 64GByte of cache.

All Symmetrix z8000 systems are available immediately and prices begin at $258,000 (£163,895) and vary based on configuration.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Data centre hardware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...