Careers & Certifications

11:13 AM
Howard Marks
Howard Marks
Repost This

NetApp Kills Off DataFort; Encryption A Feature, Not A Product

Reports that NetApp is killing off the DataFort encryption product line it acquired with Decru in 2005 signals the last gasp of the once-promising storage encryption market. While we argued over Data Domain and whether deduplication was a product or a feature, the market decided that encryption alone does not a product make.

NetApp, on the other hand, has not managed to turn an acquisition into a successful product line. The company has had what can be called , at best, a modest success with Onaro's SANscreen SAN management tools and the NearStore VTL product line derived from Alacritus's technology. Topio's continuous data protection for heterogeneous environments became NetApp's ReplicatorX before the folks in the corner office decided to rename it, yet again, and kill it off.  

The jury's still out on the Bycast object storage tech that NetApp snapped up earlier this year, but I'm not that optimistic. The rumors I'm hearing are more about making Data OnTap and filers cloudier with Bycast tech than about NetApp really pushing a new object store product line a la EMC's Atmos.

Despite some well documented delays, NetApp has done better at integrating acquired technologies into Data OnTap with Orca, Troika and, most importantly, Spinaker tech, all of which make NetApp filers the Swiss army knives of storage they are today.

2 of 2
Comment  | 
Print  | 
More Insights
More Blogs from Commentary
SDN: Waiting For The Trickle-Down Effect
Like server virtualization and 10 Gigabit Ethernet, SDN will eventually become a technology that small and midsized enterprises can use. But it's going to require some new packaging.
IT Certification Exam Success In 4 Steps
There are no shortcuts to obtaining passing scores, but focusing on key fundamentals of proper study and preparation will help you master the art of certification.
VMware's VSAN Benchmarks: Under The Hood
VMware touted flashy numbers in recently published performance benchmarks, but a closer examination of its VSAN testing shows why customers shouldn't expect the same results with their real-world applications.
Building an Information Security Policy Part 4: Addresses and Identifiers
Proper traffic identification through techniques such as IP addressing and VLANs are the foundation of a secure network.
SDN Strategies Part 4: Big Switch, Avaya, IBM,VMware
This series on SDN products concludes with a look at Big Switch's updated SDN strategy, VMware NSX, IBM's hybrid approach, and Avaya's focus on virtual network services.
Hot Topics
Heartbleed's Network Effect
Kelly Jackson Higgins, Senior Editor, Dark Reading,  4/16/2014
White Papers
Register for Network Computing Newsletters
Current Issue
Twitter Feed