Advanced enterprise storage architecture

CCTV Handbook 2021 Editor's Choice

An evolutionary next step beyond storage virtualisation and hardware abstraction, TASS (Transcendent Abstracted Storage System) enables enterprises to access, move, manage and protect all data assets transparently, utilising any available storage resource, regardless of the hardware manufacture, physical, virtual or cloud location, protocol, or platform.

TASS unifies physical, virtual, on-premise and cloud storage resources locally and globally, integrating users, applications and data services.

In a TASS architecture, NAS, object and cloud systems are unified eliminating the isolated islands and segregated silos of all traditional platforms, transcending past, present and future technologies while presenting the look, feel and simplicity of a single storage system. The 22dot6 TASS solution enables users to manage totally disparate resources, regardless of location, as effectively as cloud storage.

22dot6’s first product, its Valence software, creates a unified abstractive layer to transcend the limitations of conventional infrastructures, allow scale up/out and provide the bridge between virtualisation, hardware abstraction, data services and storage accessibility. With Valence, administrators can manage billions of files and exabytes of data within a true scale up/scale out architecture supporting a general compute HPC (high-performance computing) cluster of up to 60 data transport/access nodes per physical or virtual location and delivering data accessibility of 600 GB to 1200 GB per second within a single global namespace. Valence software offers all expected enterprise-level features plus many industry-exclusive capabilities, including the following.

Ease of integration, migration, assimilation, transition

Move data from ground to cloud, cloud to cloud, cloud to ground with live, objective-based, infinite intelligent autonomic tiering. Integrate new and old or decommission legacy systems with live transparent data mobility. Valence supports off-line data management for archives like Amazon Glacier/tape providing location/device-aware file level security, implementing GDPR regulatory and extended compliance capabilities.

High availability

Valence inherently provides simultaneous file availability in a one-to-many node active/active configuration, guaranteeing 100% utilisation of any available storage resource. All users can see and access all files in real-time through all data transport nodes and every assigned network port simultaneously, regardless of location or resource (assuming they have the appropriate permissions. Valence eliminates hot-spots and the impact of hardware failures with machine learning, AI-based predictive analysis that manages data placement to meet performance and availability objectives.

High performance

As a modern scale-out/scale-up storage platform, TASS isolates and separates metadata management, data analytics/profiling and data services from the processes of providing IOPS (input/output operations per second) and managing throughput. Valence assigns these inherently different tasks to dedicated CPUs and RAM, including SAS and PCIe board-level resources. Valence monitors all performance conditions in real-time with predictive analysis and reporting to guarantee all user defined objectives – including read/write bandwidth, IOPS and latency are maintained.

Data protection

Unlike most storage systems today that provide data services at a device or volume level, Valence provides the ability to configure all data protection services at an application, user and sub-file level. Integrated data cost analysis assigns the correct level of protection based on user definable metrics.

Valence replaces file restore with immediate reacquisition and bypasses recovery through prevention. Utilising undelete, fallback and master-copy direct access if a storage resource becomes unavailable, a file becomes corrupted, deleted or moved, Valence’s ‘Next In Line’ file, device and location transcendent accessibility seamlessly connects the user or application to the next logical copy of the file regardless of location.

Active/active multi-site

A TASS architecture fundamentally transcends the concepts of a hot and cold site or resource. All sites can be considered as active sites, sharing data in real-time to any other site and all sites can act as a primary site depending on the objective. Rather than disaster recovery or replication processes that use a hot/cold site model, Valence incorporates a ‘Master File’ model with global file awareness to provide both transparent disaster prevention and multi-site, active file accessibility.

Metadata management, with integrated data and system profiling

Valence incorporates global indexing, search and analysis tools, providing administrators native capabilities to visualise, analyse and profile files, users, activities, performance and availability, based on virtually any query regardless of where the data resides. Metadata-level management enables tagging, classification and triggers policies based on any file, application, user or system associated attribute.

Custom-defined objectives, management and reporting

What, when, where and why. Objectives can be set for cost optimisation, performance, resiliency, availability, device and/or location including scheduled permission defined accessibility, while Valence monitors and reports on virtually any aspect of the system.

Total multi-protocol support

Built to transcend the boundaries of NAS, object, cloud, S3, SMB, NFS, software-defined, physical, virtual and hybrid environments leveraging existing multi-manufacture components and off-the-shelf, commodity-based hardware.

Multi-tenant ready

Manage thousands of independent customers or internal departments isolated from each other through a unified, multi-location management console.

“Once every decade or so, breakthroughs in computing trigger an innovative leap in the way we manage, store, protect and access our data. A software-defined TASS architecture is not theoretical and represents that type of leap. Valence transcends the boundaries of your isolated islands and segregated silos of traditional storage models and gives us the ability to place and access files anywhere, anytime on anything,” said 22dot6 founder and CEO Diamond Lauffin.

For more information, go to https://22dot6.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.