Access "Veritas SANPoint Control compared with EMC ControlCenter"
This article is part of the Vol. 2 No. 5 July 2003 issue of Evaluating the benefits of IP SANs
Last month, we looked at EMC Enterprise Control Center (ECC) Open Edition (see "EMC raises the bar for SAN management") with the intention of comparing its abilities to Veritas SANPoint Control 3.5.1. Although heterogeneous support didn't amount to full control of non-EMC products, the engineering groundwork has been laid and marketing positions taken for ECC to evolve into a useful and nondiscriminatory storage area network (SAN) management offering. Veritas has engineered and built on another storage management offering in SANPoint Control 3.5.1. SANPoint Control centralizes the management of storage resources into one console by exploring your SAN fabric and discovering its supported hardware and software components. In addition to discovery and zoning, real-time event reporting--along with policy-based end-to-end management and provisioning--ensures that it can be considered next-generation and capable of sparring with EMC's ECC. How SANPoint Control works A key requirement of business continuity is that there's sufficient distance between data storage ... Access >>>
Premium Content for Free.
Close the IM Loophole
NYSE sends message about instant messages
by Jerome Wendt
Installing, configuring and maintaining Fibre Channel host bus adapters (HBAs) is the bane of many SAN administrators. Thankfully, these new cards offer better management tools.
When a Mighty Wind Blows into Town
South Floridian IT managers don't worry a whole lot about terrorism, but there's one thing they do worry about: hurricanes.
Virtual SANs put to the test
by David Braue
Cisco's new virtual SAN technology has aroused a lot of interest. But how does it work in practice? We look at how Australia's Deakin University uses VSANs to isolate development activity within its large, multisite fabric.
CAD for SANs
by John Vacca
New automated design tools can help you build the SAN of your dreams.
Drive Vendors Think Small
Seagate's incredible shrinking disk
Creating a large e-mail system
by Jim Booth
Here's how one storage team transformed a monolithic storage design into a flexible, scalable system.
- Close the IM Loophole
Roll Your Own NAS
Is building your own NAS better?
The evolving storage department
by Carol Hildebrand
Here's how to avoid common road blocks as you revolutionize your storage department.
Getting remote data right
by Marc Farley
The second of a two-part series on business continuity, this article focuses on how to use replicated data and the different types of replication: subsystem, host and network device based.
EMC Launches Space-Saving Copy Option for Symmetrix
EMC wants to save you space
SEC: No Hard and Fast Distance Minimums
SEC doesn't define distance minimums
- Serial ATA Adoption Ramping Up
IP SANs take their place
There's a growing interest in using IP for storage in small to midsized enterprises, although Fibre Channel is still dominant in large organizations. What's right for you: IP, FC or a combination of both?
- Roll Your Own NAS
How to build a storage security strategy for your enterprise
According to a Morgan Stanley December 2002 survey of 225 CIOs, security spending tops their 10 highest priorities for 2003. This article details how to build a thorough, companywide security strategy.
Intelligence belongs in the network and on the switch
Storage Bin: Intelligence belongs in the network and on the switch, but it's not going to get there in a jiffy.
Snapshot: 4Gb/s Fibre Channel Switches
Would You Buy a 4Gb/s Fibre Channel Switch?
Veritas SANPoint Control compared with EMC ControlCenter
by Darryl Brooks
In the second part of a two-part article, we review Veritas SANPoint Control and compare it with EMC ControlCenter.
Is compliance the next killer app?
by Mark Schlack
Is compliance the next killer app?
What are your backup, DR and data retention policies?
by James Damoulakis
Can you describe your backup, retention and disaster recovery policies? And do they correctly address your business needs?
- How to build a storage security strategy for your enterprise
More Premium Content Accessible For Free
Data archiving technology moves inactive data from primary storage to more suitable media. It may be used for compliance, governance or storage ...
One of the biggest challenges of building a virtual server infrastructure is fine-tuning the storage that supports the virtual machines. Having ...
Cloud storage, virtualization and the growth of unstructured data have contributed to the way storage architectures are built and used. Virtual ...