Legato Releases Data Management Suite

Legato Systems, Inc. today announced the availability of a suite of fully automated data management solutions that it says addresses the specific needs of data centers, branch offices and business continuance.

The suite, Automated Data Center, Automated Branch Office and
Automated Continuance of Data Center Operations, is available with consulting services and focuses on three areas of IT: information protection, application availability and management.

The the core component for information protection is Legato(R) NetWorker(R), Legato’s premier solution for data backup, restore, and archive. In addition, Celestra(r), a serverless backup product, is available to NetWorker customers looking for higher levels of application availability during data protection.
Legato is also reintroducing Legato Cluster under the name Legato Automated Availability Manager. As the core component for storage management, Legato will begin shipping GEMS(R) Console for integrated and simplified management of information protection across the network.

“There is so much new technology being thrown at enterprise
customers that many are throwing up their hands just when
their storage management needs are skyrocketing,” said Steve
Duplessie, Senior Analyst, Enterprise Storage Group. “To be
effective in not only making a sale but in truly helping
customers solve their problems, you have to present solutions
that are well integrated and are accompanied by consulting and
services required to support them. These new offerings should
certainly make Legato more attractive to these customers.”

Get the Free Newsletter!
Subscribe to Cloud Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter!
Subscribe to Cloud Insider for top news, trends & analysis
This email address is invalid.

Latest Articles

What Is iSCSI? Definition, Components, & Performance

iSCSI (Internet Small Computer Systems Interface) is a transport layer protocol that works on top of the transport control protocol.

What is Memory Swapping? How Memory Swapping Works

Memory swapping is a process of moving data between main memory and secondary storage. Learn more about memory swapping and its applications.

Importance of Vulnerability Scanning & Why You Should Do It

Vulnerability scanning is the process of testing and assessing the state and conditions of computer software, hardware, and networks for known weaknesses and bugs....