Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
POWAY, CA -- (Marketwire) -- 09/18/12 -- BridgeSTOR, LLC, the company Advancing Deduplicated Data Movement to the Cloud, today announced it has released its Data Deduplication File System (DDFS) to OEMs building Linux-based storage products.
DDFS supplies deduplication services as a Linux file system. Unlike existing Linux file systems, DDFS adds compression, encryption and embedded data movement for Cloud-based environments.
DDFS deduplicates all unstructured (application) data and includes specialized algorithms that recognize the unique characteristics of virtual machine images (VHD, VMDK and others). When a virtual machine image is encountered, DDFS automatically invokes this optimization to maximize the deduplication of the virtual machine image. DDFS will also natively mount virtual machine images allowing the immediate recovery of data.
DDFS enables OEM customers to offer products that address the perplexing requirement of storing VMware, Hyper-V and other virtual machine image types on magnetic tape, on disk or in the Cloud -- in a deduplicated, compressed and encrypted (for tape, compression and encryption are performed by the tape drive) format to minimize the cost and complexity of storing critical data offsite. Using DDFS, deduplicated data can be stored locally, on a network, on tape or in the Cloud.
"DDFS is our second generation product and is the result of a significant development effort by an industry-leading team of deduplication experts," says John Matze, CEO, BridgeSTOR, LLC. "OEMs building Linux-based Storage products for the consumer, the SOHO, SMB and Enterprise buyers now have a simple-to-integrate path to deduplication and Cloud services."
DDFS "NearTime" Deduplication enables deduplication to be performed inline or in a tiered mode. With NearTime Deduplication, "hot data" may exist on faster media (SSD), and once cooled, moved to slower inexpensive media such as disk or tape. NearTime Deduplication is ideal for the media and entertainment market.
DDFS' exclusive "ProtectedCloud" Security works by separating the deduplication metadata from the data blocks. This process combined with AES-256 encryption allows the metadata and data blocks to be stored in different Cloud locations; producing the strongest security available today.
DDFS deduplication can reduce storage utilization significantly. Since no two installations have identical data storage characteristics, BridgeSTOR recommends that prospective OEM customers contact BridgeSTOR to arrange for an evaluation of DDFS using data that is representative of their customers' workloads to demonstrate the effectiveness of the technology.
BridgeSTOR licenses DDFS to OEMs building Linux-based NAS products through negotiation covering quantities, terms and the amount of effort required to customize the software and satisfy the OEM's requirements.
BridgeSTOR, LLC
BridgeSTOR, LLC, headquartered in Poway, CA, near San Diego, is advancing the technology of data deduplication to bridge the gap between the data center and offsite storage. The company is extending the boundaries of data deduplication into virtual machine disaster recovery and archive, optimized virtual data transfer to the Cloud and the long-term retention of deduplicated data on magnetic tape. BridgeSTOR makes virtual machine data protection, disaster recovery and data archive simple, affordable and accessible to businesses of all sizes. The company brings data deduplication to both cloud storage and magnetic tape using on-premises Virtual Deduplication Appliances and the innovative "Deduplication as a Service" (DaaS) OPEX-only cost model to deliver a data protection experience that overcomes the limitations of traditional storage and networking as well as through negotiated terms and conditions with OEM customers.
CONTACT:
Dawn Matze
President
BridgeSTOR
800-280-8204
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs