Home Data Cohesity Helios helps manage secondary data
Cohesity solutions market director Raj Dutt Cohesity solutions market director Raj Dutt

Hyperconverged secondary storage vendor Cohesity has released Cohesity Helios, a SaaS-based secondary storage management system.

Cohesity Helios sits on top of Cohesity DataPlatform, which consolidates secondary data and apps such as back-up, test/dev, archiving and analytics in a single hyperconverged solution.

Secondary data tends to be a mess, Cohesity solutions market director Raj Dutt told iTWire, involving multiple devices (often from several vendors), typically with seven to 10 copies of data (eg, for dev/test purposes, or for analytics), and at larger organisations this is repeated at multiple sites, sometimes spread around the world.

Cohesity DataPlatform brings simplicity and consistency to this situation, and addresses four main areas: data protection, dev/test, analytics, and file and object storage. It also bridges on-premises and cloud storage.

Helios provides a single global dashboard for the visibility and management of secondary data stored at multiple locations, including data centres, cloud providers and on edge devices.

It incorporates analytics and machine learning capabilities to generate valuable insights from the data.

This improves IT productivity, simplifies business planning and continuity, and helps derive business insights, said Dutt.

Cohesity

Helios achieves this by providing a single dashboard to control multiple clusters of secondary storage, a smart assistant (that can, for example, automatically pause a backup job to make more resources available to deal with a restore task, making the decision based on the relevant SLAs), and applying machine learning to provide operational insights (eg, predicting when additional storage will be required to meet business requirements, or identifying unnecessary copies of data).

It analyses and anonymously compares operational metadata with that from other Cohesity customers, allowing comparisons of infrastructure utilisation and movement towards best practices.

Helios can also detect anomalies in admin actions, such as failing to enable encryption.

Furthermore, the Cohesity Analytics Workbench can be used to detect sensitive data by pattern (eg, credit card numbers) to help ensure their storage is in compliance, stored passwords that fail to meet best practices (eg, by incorporating the person's name) or that are held in plain text, and to transcode videos to reduce to storage space they require.

"We are ushering in a new way to address mass data fragmentation challenges that are plaguing enterprises across virtually every industry," said Cohesity chief executive and founder Mohit Aron, who was one of the founders of hyperconverged infrastructure vendor Nutanix, and previously a lead developer of Google File System.

"With Helios, we now are providing businesses with a single, global unified platform for their secondary data and apps in a way that's smart, incredibly efficient and brings new insights to massive volumes of untapped data."

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect