Home Data Cohesity Helios helps manage secondary data
Cohesity solutions market director Raj Dutt Cohesity solutions market director Raj Dutt

Hyperconverged secondary storage vendor Cohesity has released Cohesity Helios, a SaaS-based secondary storage management system.

Cohesity Helios sits on top of Cohesity DataPlatform, which consolidates secondary data and apps such as back-up, test/dev, archiving and analytics in a single hyperconverged solution.

Secondary data tends to be a mess, Cohesity solutions market director Raj Dutt told iTWire, involving multiple devices (often from several vendors), typically with seven to 10 copies of data (eg, for dev/test purposes, or for analytics), and at larger organisations this is repeated at multiple sites, sometimes spread around the world.

Cohesity DataPlatform brings simplicity and consistency to this situation, and addresses four main areas: data protection, dev/test, analytics, and file and object storage. It also bridges on-premises and cloud storage.

Helios provides a single global dashboard for the visibility and management of secondary data stored at multiple locations, including data centres, cloud providers and on edge devices.

It incorporates analytics and machine learning capabilities to generate valuable insights from the data.

This improves IT productivity, simplifies business planning and continuity, and helps derive business insights, said Dutt.

Cohesity

Helios achieves this by providing a single dashboard to control multiple clusters of secondary storage, a smart assistant (that can, for example, automatically pause a backup job to make more resources available to deal with a restore task, making the decision based on the relevant SLAs), and applying machine learning to provide operational insights (eg, predicting when additional storage will be required to meet business requirements, or identifying unnecessary copies of data).

It analyses and anonymously compares operational metadata with that from other Cohesity customers, allowing comparisons of infrastructure utilisation and movement towards best practices.

Helios can also detect anomalies in admin actions, such as failing to enable encryption.

Furthermore, the Cohesity Analytics Workbench can be used to detect sensitive data by pattern (eg, credit card numbers) to help ensure their storage is in compliance, stored passwords that fail to meet best practices (eg, by incorporating the person's name) or that are held in plain text, and to transcode videos to reduce to storage space they require.

"We are ushering in a new way to address mass data fragmentation challenges that are plaguing enterprises across virtually every industry," said Cohesity chief executive and founder Mohit Aron, who was one of the founders of hyperconverged infrastructure vendor Nutanix, and previously a lead developer of Google File System.

"With Helios, we now are providing businesses with a single, global unified platform for their secondary data and apps in a way that's smart, incredibly efficient and brings new insights to massive volumes of untapped data."

REASON TO CHOOSE TENDA MESH WIFI

Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.

· Best valued product
· Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
· Aesthetically pleasing and light weigh (blend into any room deco)
· Wireline backhauls supported
· Product units are pre-paired and easy to setup
· Not requiring phone number or email address to set up
· Wall penetration (better than other similar brands)
· Seamless WiFi roaming
· User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more

CLICK FOR MORE INFO!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect