Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

SEPATON Extends Cloud Technology to Second-Tier Storage

SEPATON today announced an appliance offering the industry’s first secondary storage capabilities designed for multi-tenancy in a cloud environment. The appliance creates virtual tape cartridge

SEPATON today announced an appliance offering the industry’s first secondary storage capabilities designed for multi-tenancy in a cloud environment. The appliance creates virtual tape cartridge

s (which are physically on disks but perceived by back-up servers as tape devices) that use what the company calls Storage Pool technology to prevent inadvertent intermingling of data, and enable data to be automatically assigned to a virtual tape device that meets various policy requirements.

SEPATON Cloud Storage

These capabilities are all associated with the release of software version 5.4 of the company’s S2100™-ES2 data protection appliance.

The company argues that although tape is seen as a less expensive medium for secondary storage than disks, other factors can change the equation, including the cost advantages of virtualized storage, the appliance’s de-duplication capabilities and the cost avoidance associated with the maintenance of tape drives.

The company uses the LUN masking techniques developed for disk drives to ensure (in the case of an outsourcing scenario) that back up servers from Client A can only see virtual tape device A, servers from Client B can only see virtual tape device B, and so on. The systems are also protected by conventional access controls.

In addition to managing secondary storage, the appliance can also provide auto-replication to remote sites if required, as well as guaranteed erasure of information on virtual tape cartridges.

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...