EMC Launching Centera Upgrades - InformationWeek
Hardware & Infrastructure
03:30 PM

EMC Launching Centera Upgrades

Virtual pooling enhancements make it easier to compartmentalize applications and secure data.

EMC Corp. on Monday will unveil virtual pooling and other enhancements to its Centera fixed-content archiving system. Virtual pooling enables administrators to create separate logical pools of fixed content such as E-mails, images, and digital assets within a single physical cluster, which can contain hundreds of terabytes of data.

The virtual pooling idea is built around compartmentalizing applications stored on Centera so that one application can't view another's data. One way that's done is by enabling the definition of data-security access rules. "Being able to carve physical clusters into virtual pools allows you to create a Centera within a Centera," says Tony Asaro, senior analyst at Enterprise Strategy Group.

EMC is also launching replication software, which, when used in conjunction with virtual pools, enables remote replication of selected pools of data rather than an entire physical cluster. The software supports both chain and star topologies. In a chain topology, fixed content is replicated to Centera systems in multiple locations; in a star topology, replication occurs from up to three Centera platforms onto a single Centera.

Taken as a whole, the enhancements are EMC's largest Centera software release to date, says Sean Lanagan, director of product management at EMC. Centera is EMC's flagship platform for fixed-content archiving; the product utilizes magnetic disk write-once, read-many storage, which ensures that permanent documents can't be erased once written.

The company earlier this year launched FileArchiver, an "information-life-cycle-management-in-a-box" product that provides automated policy-management for moving data from EMC's Celerra network-attached storage system to Centera. It also debuted a "seek" function that provides Googlelike search capabilities.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll