Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

SEPATON Extends Cloud Technology to Second-Tier Storage

SEPATON today announced an appliance offering the industry’s first secondary storage capabilities designed for multi-tenancy in a cloud environment. The appliance creates virtual tape cartridge

SEPATON today announced an appliance offering the industry’s first secondary storage capabilities designed for multi-tenancy in a cloud environment. The appliance creates virtual tape cartridge

s (which are physically on disks but perceived by back-up servers as tape devices) that use what the company calls Storage Pool technology to prevent inadvertent intermingling of data, and enable data to be automatically assigned to a virtual tape device that meets various policy requirements.

SEPATON Cloud Storage

These capabilities are all associated with the release of software version 5.4 of the company’s S2100™-ES2 data protection appliance.

The company argues that although tape is seen as a less expensive medium for secondary storage than disks, other factors can change the equation, including the cost advantages of virtualized storage, the appliance’s de-duplication capabilities and the cost avoidance associated with the maintenance of tape drives.

The company uses the LUN masking techniques developed for disk drives to ensure (in the case of an outsourcing scenario) that back up servers from Client A can only see virtual tape device A, servers from Client B can only see virtual tape device B, and so on. The systems are also protected by conventional access controls.

In addition to managing secondary storage, the appliance can also provide auto-replication to remote sites if required, as well as guaranteed erasure of information on virtual tape cartridges.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.