How VMware vSAN Data Persistence Platform and Cloudian Object Storage Drive Down Operating Costs

VMware today announced general availability of VMware Cloud Foundation 4.2. VMware Cloud Foundation with Tanzu lets organizations run both modern and traditional applications within a single management framework, thus reducing operating expenses. Cloudian is proud to be part of this announcement with the integration of Cloudian HyperStore object storage as part of this platform.

Why Cloudian Object Storage is the Ideal Target for IBM Spectrum Protect Plus

Today, enterprises have multiple choices when it comes to deploying data protection solutions for their mission-critical data and applications in data centers and the public cloud. IBM Spectrum Protect Plus in combination with Cloudian’s fully S3-compatible HyperStore object storage offers a simple, scalable, reliable and cost-effective solution to protect such workloads. IBM Spectrum Protect Plus is a modern data protection solution that provides recovery, replication, retention, and reuse for VMs, databases, applications, file systems, SaaS workloads, containers and cloud applications such as Office 365.

Cloudian Chosen for Osaka University’s New High Performance Computing Project

Osaka University and NEC have announced that Cloudian’s HyperStore object storage will be used in a new cloud-linked HPC and high-performance data analysis supercomputer system at the university. This is the latest example of customers adopting Cloudian to help them manage, protect, and extract value from their big data, capitalizing on HyperStore’s limitless scalability, cost-effectiveness, fully native S3 compatibility and industry-leading security.

5 Must-Haves in Enterprise Data Storage for Security and Compliance Needs

Data security is complicated. Compliance with security regulations has never been more important than it is today. It takes a lot of work to ensure your organization has a solid security program in place. How can you ensure you’re doing everything you can to protect your organization’s data? Here are the 5 things to keep in mind when picking a bulletproof enterprise data storage solution that not only satisfies the compliance requirements but also allows self-governance.

Cloudian and VMware Solution Update

In today’s modern IT departments everywhere, IT managers are using IT infrastructure services from both public and private cloud platforms. IT managers have figured out which workloads operate best on internal or external platforms and have settled into a hybrid cloud strategy, but ultimately public cloud services are a separate “island” of resources to manage and interaction between public and private cloud services have been limited to tiering and DR type services.

The Common Foundations of Kubernetes and Object Storage

Reading Brendan Burns’ The History of Kubernetes & the Community Behind It, I was struck by the common technical foundations of Kubernetes and object storage.  Burns lists Kubernetes’ “basic feature set” as an orchestrator to deploy and manage containers as (1) Replication to deploy multiple instances of an application; (2) Load balancing and service discovery to route traffic to these replicated containers; (3) Basic health checking and repair to ensure a self-healing system; (4) Scheduling to group many machines into a single pool and distribute work to them.

Tail of the Tape

Data storage on magnetic tape media has a long history that extends back to the earliest days of digital computing in the last century. Even with the great advancements made across all areas of computing and data processing in recent decades, traditional LTO tape still provides a valuable role as an inexpensive storage medium that can retain data for long periods with little or no power input. As such, many organizations still employ data tape as one part of their total data protection plan, which is diversified across multiple technologies.

Reducing Cybersecurity Insurance Risk while Protecting Data with Cloudian Secure Storage

Most organizations’ cybersecurity defense strategies cover just their network and firewall.  But it’s your data that is the hacker’s ultimate prize. Have you focused your defenses mostly on keeping hackers from getting in the door only to leave the very thing he is trying to steal under-protected?  Read on for a checklist of security features you should look for to be sure you have a hardened data storage and protection solution.

Ransomware Protection: Immutable Data Storage

Attacks can strike even the best-prepared, making it essential to mitigate the effects of a successful breach. In this webinar, we discuss how the cyber-attacks work and what are the key needs that are crucial to combat these challenges.