Advanced enterprise storage architecture

CCTV Handbook 2021 Editor's Choice

An evolutionary next step beyond storage virtualisation and hardware abstraction, TASS (Transcendent Abstracted Storage System) enables enterprises to access, move, manage and protect all data assets transparently, utilising any available storage resource, regardless of the hardware manufacture, physical, virtual or cloud location, protocol, or platform.

TASS unifies physical, virtual, on-premise and cloud storage resources locally and globally, integrating users, applications and data services.

In a TASS architecture, NAS, object and cloud systems are unified eliminating the isolated islands and segregated silos of all traditional platforms, transcending past, present and future technologies while presenting the look, feel and simplicity of a single storage system. The 22dot6 TASS solution enables users to manage totally disparate resources, regardless of location, as effectively as cloud storage.

22dot6’s first product, its Valence software, creates a unified abstractive layer to transcend the limitations of conventional infrastructures, allow scale up/out and provide the bridge between virtualisation, hardware abstraction, data services and storage accessibility. With Valence, administrators can manage billions of files and exabytes of data within a true scale up/scale out architecture supporting a general compute HPC (high-performance computing) cluster of up to 60 data transport/access nodes per physical or virtual location and delivering data accessibility of 600 GB to 1200 GB per second within a single global namespace. Valence software offers all expected enterprise-level features plus many industry-exclusive capabilities, including the following.

Ease of integration, migration, assimilation, transition

Move data from ground to cloud, cloud to cloud, cloud to ground with live, objective-based, infinite intelligent autonomic tiering. Integrate new and old or decommission legacy systems with live transparent data mobility. Valence supports off-line data management for archives like Amazon Glacier/tape providing location/device-aware file level security, implementing GDPR regulatory and extended compliance capabilities.

High availability

Valence inherently provides simultaneous file availability in a one-to-many node active/active configuration, guaranteeing 100% utilisation of any available storage resource. All users can see and access all files in real-time through all data transport nodes and every assigned network port simultaneously, regardless of location or resource (assuming they have the appropriate permissions. Valence eliminates hot-spots and the impact of hardware failures with machine learning, AI-based predictive analysis that manages data placement to meet performance and availability objectives.

High performance

As a modern scale-out/scale-up storage platform, TASS isolates and separates metadata management, data analytics/profiling and data services from the processes of providing IOPS (input/output operations per second) and managing throughput. Valence assigns these inherently different tasks to dedicated CPUs and RAM, including SAS and PCIe board-level resources. Valence monitors all performance conditions in real-time with predictive analysis and reporting to guarantee all user defined objectives – including read/write bandwidth, IOPS and latency are maintained.

Data protection

Unlike most storage systems today that provide data services at a device or volume level, Valence provides the ability to configure all data protection services at an application, user and sub-file level. Integrated data cost analysis assigns the correct level of protection based on user definable metrics.

Valence replaces file restore with immediate reacquisition and bypasses recovery through prevention. Utilising undelete, fallback and master-copy direct access if a storage resource becomes unavailable, a file becomes corrupted, deleted or moved, Valence’s ‘Next In Line’ file, device and location transcendent accessibility seamlessly connects the user or application to the next logical copy of the file regardless of location.

Active/active multi-site

A TASS architecture fundamentally transcends the concepts of a hot and cold site or resource. All sites can be considered as active sites, sharing data in real-time to any other site and all sites can act as a primary site depending on the objective. Rather than disaster recovery or replication processes that use a hot/cold site model, Valence incorporates a ‘Master File’ model with global file awareness to provide both transparent disaster prevention and multi-site, active file accessibility.

Metadata management, with integrated data and system profiling

Valence incorporates global indexing, search and analysis tools, providing administrators native capabilities to visualise, analyse and profile files, users, activities, performance and availability, based on virtually any query regardless of where the data resides. Metadata-level management enables tagging, classification and triggers policies based on any file, application, user or system associated attribute.

Custom-defined objectives, management and reporting

What, when, where and why. Objectives can be set for cost optimisation, performance, resiliency, availability, device and/or location including scheduled permission defined accessibility, while Valence monitors and reports on virtually any aspect of the system.

Total multi-protocol support

Built to transcend the boundaries of NAS, object, cloud, S3, SMB, NFS, software-defined, physical, virtual and hybrid environments leveraging existing multi-manufacture components and off-the-shelf, commodity-based hardware.

Multi-tenant ready

Manage thousands of independent customers or internal departments isolated from each other through a unified, multi-location management console.

“Once every decade or so, breakthroughs in computing trigger an innovative leap in the way we manage, store, protect and access our data. A software-defined TASS architecture is not theoretical and represents that type of leap. Valence transcends the boundaries of your isolated islands and segregated silos of traditional storage models and gives us the ability to place and access files anywhere, anytime on anything,” said 22dot6 founder and CEO Diamond Lauffin.

For more information, go to https://22dot6.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...