Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains -- making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.
Event Date: February 9, 2017
In the last decade, the rate of compute and network performance have outpaced storage. Compute nodes with multiple cores, advanced memory technology, high-speed bus and fast network NICs have kept pace with speed of networks such as 25GbE/40GbE and growing to 100GbE.
Unfortunately, most storage architectures -- even the new clustered scale up/out architectures -- are nothing more than derivatives of older legacy designs. As a result storage has become the primary …