Putting secondary storage to work

1 September 2019 Infrastructure, Security Services & Risk Management

It is a myth that organisations have to be huge to leverage HyperScale solutions. The simple truth is that data is growing a lot faster than storage budgets, which is proving challenging to businesses that do not have the resources of their larger counterparts.

As a result, enterprises are having to rethink how they use software-defined and commodity-based storage to lower costs and maintain the flexibility and scalability needed to keep up with business requirements, industry developments and competitors.

HyperScale solutions can address this increasing trend towards enterprises leveraging their secondary storage as a means to advance their business, IT and broader digital transformation initiatives.by providing a unified, modern data protection and management platform that delivers cloud-like services on-premise.

Enterprises too are seeking the benefits of HyperScale computing, to achieve lower costs, greater efficiency and true server hardware commoditisation. According to the 2018 Gartner Magic Quadrant report, by 2022, more than 80% of enterprise data will be stored in scale-out storage systems in enterprise and cloud data centres, up from 40% in 2018. The report also states that end users have been reporting unstructured data growth as exceeding 50% year-over-year and are looking for flexible on-premises storage products that can address an increasing number of use cases with lower acquisition, operational and management costs.

HyperScale is about achieving massive scale-out goals in computing, usually for purposes of big data or cloud computing, with the hardware and software designed for horizontal scalability that bring high levels of performance, throughput, and redundancy to enable fault tolerance and high availability.

Historically, many technology companies had recognised the scalability and flexibility of hyper-converged and scale-out architecture, but much of the horizontal scaling debate had been focused on the primary storage tier.

Recently however, it has become increasingly clear that scale-out architecture helps eliminate silos in backup and archive, enabling enterprises to scale horizontally as their data grows. It is then, no surprise, that as businesses continue to look for new ways to get increased value from secondary data, they are finding that their current architectures simply cannot meet the demands of storing and managing increasing workloads, while they evolve to newer environments.

At the same time, enterprise IT is undergoing a transformation with the maturing of public cloud providers that offer compute, storage and application services with unprecedented elasticity, scale, resiliency and availability, on a consumption-based economic model. With some workloads shifting to the cloud, enterprises, regardless of size, need to transform their internal data centres and service offerings for more cloud-like scale, flexibility, resiliency and operational methods, which in turn lead to similar economic outcomes.

Therefore, architects are augmenting or replacing traditional, proprietary and single purpose IT infrastructure and applications with software defined services, distributed processing, big-data applications and hyper-converged architectures running on general purpose, easily (and affordably) replaceable hardware.

Transforming mission-critical applications and workloads can prove to be difficult and disruptive, but this is not the case for secondary infrastructure. It is estimated that most infrastructure capacity is used for secondary workloads and storage, meaning businesses can accelerate their transformation initiatives with less disruption by targeting this secondary tier of infrastructure.

HyperScale solutions enable this shift for secondary storage and workloads, driving cloud-like economics and critical services using secondary data, while also offering the option to extend these services into the public cloud.


Johan Scheepers

By harnessing the right HyperScale offering, customers can benefit from true enterprise-scale coverage with an integrated, modern scale-out approach to meet all current and future data demands of their businesses, while at the same time, adding market-leading data management software fully baked-in as a matter of course too.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.