Examples of unstructured data
Email messages, instant messages, text messages...
Text files, including Word documents, PDFs, and other files such as books, letters, written documents, audio and video transcripts...
PowerPoints and SlideShare presentations
Audio files of music, voicemails, customer service recordings...
Video files that include movies, personal videos, YouTube uploads...
Images of pictures, illustrations, memes...
Establishing a sophisticated, central repository for the crown jewels, including granular security including authentication, access tiers and controlled permissions
Supporting sufficient storage and backup for the crown jewels database
Enabling tracking for which employees are placing information in that repository and accessing data stored there
Encryption of sensitive documents
Implementing Secure Socket Layer (SSL) protocol, which manages authentication and encrypted communication between users in a network
Using security information and event management (SIEM) tools to analyze security activity in real-time
Password protecting devices and keeping passwords protected and separate from encrypted documents
Employing remote access to wipe and locate lost or stolen devices
Training employees on policies, procedures and safeguards to ensure widespread adoption and enforcement of programs
I introduce this next step before I click the first time
After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data.
Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
I introduce this next step before I click the first time
After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data.
Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
I introduce this next step before I click the first time
After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data.
Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
I introduce this next step before I click the first time
After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data.
Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
The setup is pretty easy, but the first click shows just the drive failure. The data shows as there still, giving an opportunity to stress that the data is gone on the second click.
Before the third click, it’s important to stress that it’s only necessary to copy the objects necessary to ensure three copies of them on different devices. Contrast this with the overhead of reading every single sector in a RAID array and then writing to every single sector on a replacement disk. The third click then re-enforces this message.
Next comes the drive rebuild. Discuss the drive being replaced as you click the first time here. Then describe how we just need to copy the objects necessary to balance the data and ensure maximum data protection. Once you’ve setup the message, click again to make it visual.
I introduce this next step before I click the first time
After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data.
Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
I introduce this next step before I click the first time
After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data.
Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
I introduce this next step before I click the first time
After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data.
Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
OneBlox 5210 & OneBlox 4312
Scale-out Architecture:
OneBlox employs a seamless scale-out Ring architecture supporting multiple OneBlox appliances presenting a single global file system. A Ring may consist of one or multiple OneBlox, scaling from a few TBs to hundreds of TBs of raw flash or multiple PBs of hard-drive storage capacity. As business storage requirements change, OneBlox is extremely agile; simply add any number of drives, at any time, and in any capacity granularity to meet your storage requirements. OneBlox simply grows the global storage pool with zero configuration and no application downtime.
Scale-out Storage for Virtual Environments:
OneBlox uniquely supports VMware and Hyper-V environments by enabling virtual machines to utilize scale-out NFS datastores. Consolidate multiple NFS datastores in a single OneBlox Ring and scale to hundreds of TBs with OneBlox’s advanced data reduction. Need high performance? OneBlox 5210 is an all-flash array for consolidating performance hungry virtual machines. Need more capacity? Simply scale-out OneBlox by adding drives or OneBlox and the virtual servers instantly see additional storage capacity--with zero configuration.
OneBlox 5210
Dynamic Growth:
Bring your own drives—HDDs and select SSDs from the compatability guide. No RAID, no LUNs, no volumes. OneBlox delivers the flexibility for organizations to mix-and-match drive types (SATA, SAS) and drive capacity within the same OneBlox and within a OneBlox Ring. Purchase exactly the capacity your organization needs at the beginning and then in the future, increase capacity by mixing and matching any number of additional drives. OneBlox automatically pools the new storage within the existing global storage pool. No disruption to applications or users. No configuration settings to complete. No mouse clicks. No command line entries. No storage PhD required.
Flexible Multi-Site Replication:
Implement disaster recovery with asynchronous multi-site replication. Employ a flexible one-to-one, one-to-many, many-to-one bi-directional replication architecture with multiple OneBlox rings. Implement exactly the configuration that suits the business needs of geographically distributed environments. Only deduplicated and compressed data is replicated, ensuring the transfer is very bandwidth efficient. Other vendors require the source and target storage infrastructure to be identical. OneBlox by StorageCraft does not impose any such restrictions for the utmost flexibility.
Zero Configuration:
Ease of use is not an afterthought with OneBlox. OneBlox is easily can be installed in less than 15 minutes, provisioned and available to serve data with zero configuration. Simply insert at least two drives, plug in Ethernet, and power it on. It’s that easy. Need to add more storage? Simply add drives and the capacity is added to the same global storage pool. Need to add availability or performance? With no interruption to applications or users, additional OneBlox nodes can be added and automatically configured, enabling organizations non-disruptive scalability with their business.
Always-On Information:
OneBlox by StorageCraft’s distributed file system is built on top of a fine-grained content-addressable distributed object store with a hashed ring architecture that has small but variable-sized immutable objects as its foundation. This underlying technology allows OneBlox Ring to fully protect the stored information without legacy RAID technologies. OneBlox transparently replicates and intelligently distributes the data objects across multiple drives within a failure domain and protects against drive or OneBlox failures. In case of failure, data objects are redistributed and rebalanced to ensure full protection.
OneBlox 4312
Cloud-based Management:
OneSystem is a secure cloud-based management platform that proactively monitors, reports, and manages OneBlox in any location and from any browser. Eliminating the need for dedicated servers and time consuming software upgrades, simply login and gain the necessary insight into your storage infrastructure. Whether you have responsibility for a single location or multiple locations, OneSystem’s administration capabilities empower you to manage the entire storage infrastructure. Simply and securely.
Continuous Data Protection:
OneBlox’s continuous data protection ensures that all of the information stored is fully protected. By taking continuous and unlimited snapshots of information written to OneBlox, every file can be easily recovered in the event of data corruption, deletion, or other errors. In fact, end users can recover their own information, simply by navigating through Mac Finder or Windows Explorer. No need to restore information from last night’s backup, simply browse and recover.
Always-on Information:
With its real-time replication, information stored in a OneBlox ring is fully protected. By avoiding legacy RAID technologies, OneBlox is able to transparently replicate and redistribute the data across multiple drives and OneBlox to protect against two drive or OneBlox failures. Additionally, with its advanced architecture, information is protected against an entire ring failure when replication over wide-area distances is implemented. OneBlox grows with your business’ data protection requirements without requiring costly downtime, reconfiguration, or forklift upgrades.