Tuesday, March 4, 2025
HomeNew PostStorONE's New Release Drives Down Storage Prices and Revolutionizes Storage Pricing

StorONE’s New Release Drives Down Storage Prices and Revolutionizes Storage Pricing

Published on

SIEM as a Service

Follow Us on Google News

StorONE recently announced a significant update to the StorONE Storage Engine designed to enable companies to lower costs and improve performance.

Advanced Auto-Tiering

The latest update includes a revolutionary new auto-tiering algorithm that provides consistent performance in hybrid configurations. Organizations can meet their performance and capacity requirements with a single storage engine, eliminating the need for multiple storage systems and costly storage migrations. When combined with the company’s industry-leading RAID rebuild capabilities,the new auto-tiering algorithm enables organizations to safely use the highest density Flash and Hard Disk Drives without concern of inconsistent performance or prolonged drive-recovery efforts.

Greater Scalability

The update also further improves StorONE’s industry-best metadata management enabling customers to scale to 20 PBs without needing a TB+ of memory like competing solutions. This development effort is another example of StorONE’s ongoing quest to provide the most resource-efficient storage solution on the market.

Flexible Encryption

The latest release also includes the most flexible data encryption capabilities available today. Customers can choose to encrypt via software on a volume-by-volume basis. This option enables them to use application-level encryption when available while using StorONE’s volume-based encryption for other use cases that don’t provide it natively, like NAS or some hypervisors. Organizations that require complete encryption across all data can select self-encrypting drives, which the new release supports.

Ransomware Resiliency

Ransomware continues to be a daily threat to most organizations. StorONE has enhanced its 360° ransomware protection withnew telemetry information. Customers can take snapshots every 30 seconds and retain up to 500K per volume without impacting performance. This snapshot granularity is sometimes necessary to fully recover from a ransomware attack.

Now, when an organization is under attack, StorONE alerts the customer and pinpoints the best immutable copy to use for recovery. Additional protection has been added with two-factor authentication to help prohibit unauthorized access.

Revolutionary Pricing

In addition to the new software update, StorONE also announced a revolutionary new pricing model based on the number of drives used, breaking free of expensive capacity-based license schemes that punish customers for using high-density drives. StorONE’s new pricing model encourages them to implement the highest density drives available and then, in a few years, seamlessly replace those drives with even higher density drives without paying additional software license fees.

Conclusion

StorONE’s Engine enables customers to do more with less; more performance from 1/3 the number of flash drives and more capacity from 1/3 the number of hard disk drives of competing solutions.  Their new drive-based pricing model rewards customers for adopting StorONE’s strategy of highly dense storage architectures, resulting in hardware, software, and data center operational savings.

Latest articles

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...