13
Sat, Jul
4 New Articles

SEPATON Marks Midyear with Innovative Products, New Strategic Alliance, and Record Customer Adoption

Storage
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

More than 4,000 customer systems are now protected by SEPATON solutions representing greater than 400 PB under management. 

SEPATON, Inc., a provider of enterprise-class disk-based data protection solutions, has announced that it closed the first half of 2010 with new product innovations targeted for large enterprises, managed service providers (MSPs) and private clouds; a new strategic alliance with Hitachi Data Systems; and record customer adoption. More than 4,000 systems and 400+ PB of data are currently protected and managed by SEPATON technology. This success builds upon the company’s seven-year record of providing intelligent data protection solutions with unparalleled performance, unique grid scalability, and its ContentAware technology to manage all phases of the data protection lifecycle. 

“SEPATON executed well across all functional areas of our business," said Mike Worhach, president and CEO, SEPATON. "Our strategic alliances came through with our newly inked partnership with top-tier storage vendor Hitachi Data Systems, and our engineering team delivered many new capabilities such as the secure erasure of sensitive information and new data protection innovations with ContentAware data analytics and storage pooling for supporting MSPs and cloud deployments,” he said. “This is the result of our continued focus on delivering leadership features, performance, and product superiority to customers," he said. "The first S2100-ES2 Series 2900 deployments are underway and we are actively engaged with the HDS sales team and building strong momentum in North America which will roll into EMEA and PAC this quarter.”

In its July 2 issue, eWEEK offered a snapshot of important continuing trends in data storage. Leading the list is storage pooling, defined by eWEEK as an approach to storage virtualization that delineates specific areas of the storage system to be dedicated to specific data flows to enable more efficient multitenant service deployments, for example.

“While most other de-duplication vendors continue to trot out proprietary, overpriced stovepipe arrays with embedded ‘value add’ software that doesn’t add enough value to justify the huge markup on commodity disk drives, SEPATON seems to have discovered a technology for which there is a real need: storage analytics,” said Jon Toigo, president, Toigo Partners. “I like what they are up to and can see it eventually displacing de-dupe as a driver of company profitability and customer value.”

Completing the first half of 2010, SEPATON has achieved these significant goals:

Expanded Market Presence:

Growth in customer base: 4,000+ customer systems are currently protected by SEPATON data protection solutions and more than 400 PB under management. Twenty-five percent of existing customers added to their investment in SEPATON solutions in the first half of 2010 across a broad range of vertical industries, including financial, government, healthcare, energy, manufacturing, aerospace, automotive, entertainment, transportation, education and retail.

New strategic alliance. SEPATON entered into a strategic agreement with Hitachi Data Systems and is shipping the Hitachi Adaptable Modular Storage 2100 array as the storage foundation of the SEPATON S2100-ES2 Series 1900 and 2900 featuring 99.999 percent data availability and an integrated DeltaView central management suite.

Industry accolades: Award recognitions include 2010 Red Herring North America 100 Finalist and winner of the Tech Awards Circle, taking bronze in the Midrange Hardware category for the SEPATON S2100 data protection appliance with DeltaStor deduplication software.

Regional expansion: New regional office established in Frankfurt to support central Europe and targeting new partnerships with leading European resellers.

Product Innovations:

The introduction of a new award winning multi-node midrange deduplication offering: S2100-MS2 with DeltaStor software cost-effectively meets the data protection needs of midsized enterprises that are hampered by scalability limitations of single-node systems.

Expanded backup support: EMC NetWorker support is added to the list of backup applications supported by DeltaStor and DeltaRemote, which also includes Symantec NetBackup (7.0), IBM TSM (6.2), and HP Data Protector.

Symantec’s NetBackup OpenStorage (OST) application programming interface (API): Demonstrated support for OST with the S2100-ES2 and DeltaStor software, facilitating backup to disk without emulating tape, streamlining the backup process for joint customers.

The introduction of Secure Erasure option: Providing guaranteed, auditable erasure of information on virtual tape cartridges, Secure Erasure enables storage administrators to schedule all or selected cartridges for a total data overwrite with National Institute of Standards and Technology (NIST) approved data pattern for clearing or purging low, medium and high sensitivity data to ensure that no data can be retrieved from those tape cartridges.

Data protection for the cloud: New version 5.4 software ships with features for cloud scale data protection including secure multi-tenancy based on SEPATON’s innovative Storage Pool technology and DeltaStor deduplication; ContentAware Analytics, providing the information needed to optimize performance, maximize system utilization and accurately project cost and resource requirements for the future; and improved WAN optimization for DeltaRemote.

About SEPATON, Inc.

SEPATON’s data protection appliances deliver high performance solutions for backup, restore, deduplication, replication and disaster recovery that enable enterprises to ensure the right data is in the right place at the right time. SEPATON designed its unique DeltaScale architecture to enable all of its products to deliver grid scalability and unparalleled performance. SEPATON’s next-generation ContentAware approach provides advanced deduplication as well as intelligent monitoring and management of data throughout the complete data protection lifecycle. As a result, companies around the world rely on SEPATON products to provide the data asset protection and dynamic access to data that are critical to their business success and continuity. The company has offices throughout the United States, Europe and Asia and partnerships with leading resellers and OEMs worldwide. For additional information call 866-SEPATON or visit http://www.sepaton.com.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: