Average Ratings 6 Ratings
Average Ratings 0 Ratings
Description
QuantaStor, a unified Software Defined Storage platform, is designed to scale up and down to simplify storage management and reduce overall storage costs. QuantaStor storage grids can be configured to support complex workflows that span datacenters and sites. QuantaStor's storage technology includes a built-in Federated Management System that allows QuantaStor servers and clients to be combined to make management and automation easier via CLI and RESTAPIs. QuantaStor's layered architecture gives solution engineers unprecedented flexibility and allows them to design applications that maximize workload performance and fault tolerance for a wide variety of storage workloads. QuantaStor provides end-to-end security coverage that allows multi-layer data protection for cloud and enterprise storage deployments.
Description
Red Hat® Ceph Storage is a flexible and highly scalable storage solution designed for contemporary data workflows. Specifically developed to support data analytics, artificial intelligence/machine learning (AI/ML), and other emerging applications, it offers software-defined storage compatible with a variety of standard hardware options. You can scale your storage to extraordinary levels, accommodating up to 1 billion objects or more without sacrificing performance quality. The system allows you to adjust storage clusters up or down seamlessly, ensuring there is no downtime during the process. This level of adaptability provides the agility necessary to accelerate your time to market. Installation is notably simplified, enabling quicker setup and deployment. Additionally, the platform facilitates rapid insights from vast quantities of unstructured data through enhanced operation, monitoring, and capacity management tools. To protect your data from external threats and hardware malfunctions, it comes equipped with comprehensive data protection and security features, including encryption at both the client-side and object levels. Managing backup and recovery processes is straightforward, thanks to a centralized point of control and administration, allowing for efficient data management and enhanced operational efficiency. This makes Red Hat Ceph Storage an ideal choice for organizations looking to leverage scalable and reliable storage solutions.
API Access
Has API
API Access
Has API
Integrations
Amazon S3
CloudCasa
Docker
Grafana
IBM Cloud
IBM Fusion
IBM Storage Suite for IBM Cloud Paks
Kemp LoadMaster
Mattermost
Microsoft Azure
Integrations
Amazon S3
CloudCasa
Docker
Grafana
IBM Cloud
IBM Fusion
IBM Storage Suite for IBM Cloud Paks
Kemp LoadMaster
Mattermost
Microsoft Azure
Pricing Details
$/TB based on scale
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
OSNEXUS
Founded
2010
Country
United States
Website
www.osnexus.com/products/software-defined-storage
Vendor Details
Company Name
Red Hat
Founded
1993
Country
United States
Website
www.redhat.com/en/technologies/storage/ceph
Product Features
Backup
Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration
Data Replication
Asynchronous Data Replication
Automated Data Retention
Continuous Replication
Cross-Platform Replication
Dashboard
Instant Failover
Orchestration
Remote Database Replication
Reporting / Analytics
Simulation / Testing
Synchronous Data Replication
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking