Home Cloud Computing New Cohesity’s DataPlatform 4.0 Write Once Read Many (WORM) Feature

New Cohesity’s DataPlatform 4.0 Write Once Read Many (WORM) Feature

New Cohesity’s DataPlatform 4.0 Write Once Read Many (WORM) Feature
0

With the latest Cohesity 4.0 release, we have made significant enhancements to our Distributed File Services and the storage abstractions presentations that are provided by the Cohesity DataPlatform. One of those enhancements is the support for write-once-read-many (WORM) file systems within Cohesity Views. Cohesity Views are logical constructs that are utilized a storage location with NFS and SMB mount paths on the Cohesity Cluster. Views are used to store data such as files, backup Snapshots, and cloned VMs.

Write once read many (WORM) is a data integrity and write protection functionality that is applied onto storage devices to prevent modification of information once data has been written. This is a feature that assures that information or data cannot be altered once is written and stored on a storage device. This feature and its capabilities greatly utilized for regulatory or corporate compliance in many industries where long-term retention or archival is mandated by government or corporate regulations or compliance rules. The long-term data retention periods can be in the range of days to multiple years.

Read the entire article here, New Cohesity’s DataPlatform 4.0 Write Once Read Many (WORM) Feature

via Rawlinson Rivera at Punching Clouds.

Featured Resources:

Related Articles:

PunchingClouds by Rawlinson Rivera This is a personal blog focused on capturing and sharing the breakthroughs and solutions within the virtualization industry, in particular the advancements that are being made in the field of Cloud Computing. I’ll blog about topics such as security issues, implementations, and new technologies using videos and how-to demos.

Leave a Reply

| LATEST RESOURCES

White Papers

    Gartner: My “How to Hunt for Security Threats” Paper Published

    My mini-paper on threat hunting is out!Review “How to Hunt for Security Threats” (Gartner GTP access required) and provide feedback here. The abstract states “Technical professionals focused on security are starting to explore the mysterious practice of “threat hunting” to improve their security monitoring and operations. This requires uniquely skilled personnel and wide-ranging data collection […]

    Downloads

      Base Image Script Framework (BIS-F) – Version 6.0.0

      The perfect way to seal your Base Image Every time you build you’re base Image from scratch or update it, you must seal it before deploying it to your cloned devices. No matter if you are using Citrix XenApp/XenDesktop with Machine Creation Services (MCS) or Provisioning Services (PVS), VMware View or Microsoft only, BIS-F supports […]

      On-Demand Webinars

        Latest Videos

          Optimizing IT performance in the era of modern hybrid networks – On-Demand Webinar

          Hybrid networks, the answer to the cloud debate, are the network infrastructures of the future. Organizations facing challenges while migrating to these are looking for solutions. ManageEngine offers solutions for both traditional on-premises as well as public and private cloud-based services. Monitor and manage your modern hybrid network with ManageEngine’s OpManager and Site24x7. Learn more […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win a Tesla P100D

          Visit our Sponsors!


          Close
          Do NOT follow this link or you will be banned from the site!