Saturday, June 14, 2025
HomeNew PostStorONE's New Release Drives Down Storage Prices and Revolutionizes Storage Pricing

StorONE’s New Release Drives Down Storage Prices and Revolutionizes Storage Pricing

Published on

SIEM as a Service

Follow Us on Google News

StorONE recently announced a significant update to the StorONE Storage Engine designed to enable companies to lower costs and improve performance.

Advanced Auto-Tiering

The latest update includes a revolutionary new auto-tiering algorithm that provides consistent performance in hybrid configurations. Organizations can meet their performance and capacity requirements with a single storage engine, eliminating the need for multiple storage systems and costly storage migrations. When combined with the company’s industry-leading RAID rebuild capabilities,the new auto-tiering algorithm enables organizations to safely use the highest density Flash and Hard Disk Drives without concern of inconsistent performance or prolonged drive-recovery efforts.

Greater Scalability

The update also further improves StorONE’s industry-best metadata management enabling customers to scale to 20 PBs without needing a TB+ of memory like competing solutions. This development effort is another example of StorONE’s ongoing quest to provide the most resource-efficient storage solution on the market.

- Advertisement - Google News

Flexible Encryption

The latest release also includes the most flexible data encryption capabilities available today. Customers can choose to encrypt via software on a volume-by-volume basis. This option enables them to use application-level encryption when available while using StorONE’s volume-based encryption for other use cases that don’t provide it natively, like NAS or some hypervisors. Organizations that require complete encryption across all data can select self-encrypting drives, which the new release supports.

Ransomware Resiliency

Ransomware continues to be a daily threat to most organizations. StorONE has enhanced its 360° ransomware protection withnew telemetry information. Customers can take snapshots every 30 seconds and retain up to 500K per volume without impacting performance. This snapshot granularity is sometimes necessary to fully recover from a ransomware attack.

Now, when an organization is under attack, StorONE alerts the customer and pinpoints the best immutable copy to use for recovery. Additional protection has been added with two-factor authentication to help prohibit unauthorized access.

Revolutionary Pricing

In addition to the new software update, StorONE also announced a revolutionary new pricing model based on the number of drives used, breaking free of expensive capacity-based license schemes that punish customers for using high-density drives. StorONE’s new pricing model encourages them to implement the highest density drives available and then, in a few years, seamlessly replace those drives with even higher density drives without paying additional software license fees.

Conclusion

StorONE’s Engine enables customers to do more with less; more performance from 1/3 the number of flash drives and more capacity from 1/3 the number of hard disk drives of competing solutions.  Their new drive-based pricing model rewards customers for adopting StorONE’s strategy of highly dense storage architectures, resulting in hardware, software, and data center operational savings.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...