Users urged to move on beyond SAN

Data compliance and management issues have brought storage technologies to the fore at this year's CeBit exhibition.

Data compliance and management issues have brought storage technologies to the fore at this year's CeBit exhibition.

Analysts are recommending that visitors consider emerging storage virtualisation and grid-based storage technologies as ways of moving beyond their storage area network (SAN) setups.

Analyst firm IDC will hold a breakfast briefing for CeBit conference attendees on Friday morning. Claus Egge, programme director for European storage systems research, who will chair the meeting, said that although storage hardware was considered a commodity product, user organisations still spent "an awful lot of time dealing with storage".

He urged businesses to use CeBit to investigate "how to get their information under control - start thinking of a plan to manage the vast amount of files".

Smaller organisations should investigate "how to achieve better protection of mission-critical data as well as not-so-critical data", he added.

Dave Reinsel, programme director for storage research at IDC, will talk about how storage virtualisation can help not just corporate users, but also small and mid-sized firms, which face increasing storage and archival demands from compliance regulations, data protection, and specialised applications such as medical imaging.

One storage software supplier that will be showing its new products at CeBit is Plasmon, which will be exhibiting three new archival and RAID storage products. In particular, the UDO (Ultra Density Optical) archive appliance is a hybrid, tiered system designed for long-term document retention that complies with regulations requiring record authenticity.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Integration software and middleware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...