Data Application Performance with Isilon

Isilon delivers increased performance for file-based data applications and workflows, from the highest performance, I/O-intensive applications, to primary and secondary storage, to nearline archives, all from a single file system architecture. Powered by the OneFS® Operating System, all components in an Isilon cluster create a unified pool of highly efficient storage-with a proven 80 percent storage utilization rate. Isilon’s high efficiency means less physical storage is required to house the same amount of data, reducing capital and operating costs.

NEXSAN: A different kind of storage experience

Nexsan provides a comprehensive range of enterprise-class, easy-to-use and efficient system solutions that offer customers the ultimate value proposition when it comes to meeting their ever-evolving storage requirements.

 

Nexsan Assureon and Unity Active Archive Secure Archive Storage

Nexsan AssureonTM and Unity Active Archive protect your valuable data and meets your file integrity, security, privacy and compliance requirements. Assureon and Unity Active Archive simply reject data tampering or corruption attempts utilizing a superset of the storage requirements for compliance regulations like HIPAA, SEC17a-4, Dodd-Frank, SOX, PCI, FDA22, and more.

Assureon and Unity Active Archive include auditing, integrity checks, unique file fingerprints, serial numbers and self-healing features that protect the data from being corrupted in any way including ransomware. Assureon and Unity Active Archive offload data from primary storage to free up space for active data and greatly reduces storage costs and the complexity of backups.


File Fingerprinting

Fingerprints using both MD5 and SHA1 hash of content and metadata, insuring history and contents cannot be altered after the fact.

File Redundancy

Makes two copies of the file and its fingerprint are stored in a separate RAID disk set either in the same system or a remote one.

File Serialization

Serial numbers are assigned to each individual file to ensure no files are changed, missing, or inappropriately added.

Secure Time Stamp

Use of a global, redundant, secure time source using Stratum Level 1 hardware time sources to ensure accurate time stamp.

Auto File Repair

Continually verifies against fingerprints and repairs using copies and safeguarded by RAID disk arrays for days or even decades.

Regulatory Compliance

Governmental and Corporate compliance of HIPAA, GLBA, Sarbanes-Oxley, Federal Rules of Civil Procedure (FRCP), SEC 17A-4 and PCI DSS.

Secure Cloud Archive

Files are individually encrypted with its own AES-256 key to provide separation, security, and reporting of data for each client, enabling easy import into billing systems.

Storage Optimization

Archiving unstructured and infrequently used data frees up primary data and dramatically reducing the size, time and cost of the backup process.

Data Longetivity

Ensures adherence to guidelines for data retention, disposition, privacy, protection, chain of custody, litigation readiness and risk mitigation.



http://nexsan.sharedvue.net/sharedvue/iframe?sviresizer=nexsan.partnerco.net&svunpublished=true&svpage=products_assureon

Fortinet

Effective and Efficient Security for the Public Cloud

 

Security in the public cloud is a shared responsibility. The provider secures the infrastructure, but you need to protect what you put in the cloud. FortiGate next generation firewalls (NGFW) let you easily and cost-effectively keep your workloads safe in clouds such as AWS, Microsoft Azure, and OpenStack-based.

FortiGate next generation firewalls enable and secure your cloud deployments with:

Top-rated protection tested by NSS Labs, Virus Bulletin, and AV Comparatives
Simplified security with easy-to-manage, single-platform solution across on-premises and cloud deployments
Cloud-ready multitenant and virtual domain support for multi-tiered security function segmentation
Actionable reports to enforce policies, understand targeted attacks, and meet compliance

Fortinet

Extreme Networks

extreme_security_photo1

ExtremeSecurity 

Security & Policy Management from Network Node to Individual Device!

Expect adaptive control, granular visibility, and simplicity from your security solution. Detailed, context-based awareness, event triggering, and detailed reports ensure valuable network resources are safe and available.

Intrusion Prevention System

Provides exceptional functionality by locating, containing, and removing the source of the attack from the network.

Security Analytics

Uses advanced surveillance and forensics analysis to deliver situational awareness of both external and internal threats.

“No one else had the full level of policy that Extreme Networks had; a few vendors could do some policy but they didn’t have the management platform to push it out across the network,”

                        – Dave Hayler, Director of IT Infrastructure & Systems, Appalachian State University

Extreme Networks