EMC Qualifies Crossroads Router

Crossroads Systems Inc. , a global provider of connectivity for storage networking solutions, announced today that EMC Corporation has qualified the Crossroads 8000 storage router as E-Lab Tested.

E-Lab Tested is the centerpiece of EMC’s E-Infostructure Interoperability Program. The E-Lab Tested process qualifies the interoperability of third-party products within an information storage network, enabling customers to deploy heterogeneous storage networks, quickly, reliably and cost effectively.

As part of the E-Infostructure Interoperability Program, companies maintain cooperative service agreements for fast, streamlined support of joint customers, and together provide advanced storage networking configurations for applications such as long-distance storage and remote disk mirroring.

“Crossroads continues to demonstrate its commitment to interoperability by meeting the performance and reliability requirements of EMC’s rigorous product interoperability testing program,” said Rich Lautzenheiser, vice president of marketing and business development, Crossroads Systems. “The Crossroads 8000 multi-protocol storage router has successfully completed EMC’s requirements for being E-Lab Tested, and we are pleased to offer it to our customers as part of a reliable and robust SAN solution.”

As part of its E-Lab Tested process, Crossroads 8000 has also been qualified to interoperate with EMC’s backup solution, EMC Data Manage.

Get the Free Newsletter!
Subscribe to Cloud Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter!
Subscribe to Cloud Insider for top news, trends & analysis
This email address is invalid.

Latest Articles

Stateful vs Stateless Firewalls: Comparing the Differences

Stateful and stateless firewalls have several core differences. Learn how stateful and stateless firewalls differ now.

10 Best Open Source Storage Software for Enterprises in 2023

These 64 Open Source Storage Projects help you create a NAS/SAN device, set up cloud storage, backup your system & more. Click here now.

How to Do a Vulnerability Scan Effectively in 6 Steps

Vulnerability scans are the process of examining and scrutinizing a piece of digital infrastructure — software or hardware — in order to locate and...