Broadberry CyberStore 424DSS review
This unified network storage product combines NAS, IP SAN and FC SAN operations and has great expansion potential. Dave Mitchell finds out if the affordable platform is the perfect all-rounder.
Replication is supported so any volume can be mirrored to another Open-E appliance. During creation you can schedule snapshots to another local volume for regular point in time backups. NAS shares can be designated as WORM volumes and any type of volume can be expanded on the fly into spare space.
For IP SAN configuration you enter a size for each target, assign a LUN and enable CHAP authentication if required. Thin provisioning has yet to be implemented in DSS but a valuable feature is iSCSI failover as two physical adapters can be bound into a single virtual adapter so if one fails, all traffic is routed over the active one.
It's just as easy to create NAS shares and for access control, you can apply local user and group lists, workgroup or AD authentication. HTTP and FTP access can be allowed or denied on each share and for the latter you can limit the number of connections and enforce encrypted transfers.
NAS shares can also have virus scanning applied as Open-E has the open source ClamAV engine ready and waiting. It can be set to regularly scan selected shares, quarantine infected files to another share and automatically download signature database updates.
Virus scans can be run on selected NAS shares and the appliance can look after its own backup jobs
The appliance also manages its own backup jobs where it secures selected volumes to a NAS share or a locally attached tape drive. Jobs can be scheduled regularly and can comprise full, incremental and differential backups. Open-E also provides embedded agents for popular backup products including Symantec's Backup Exec and CA's ARCserve.
In This Article
Choosing a collaboration platform
Eight questions every IT leader should askDownload now
Performance benchmark: PostgreSQL/ MongoDB
Helping developers choose a databaseDownload now
Customer service vs. customer experience
Three-step guide to modern customer experienceDownload now
Taking a proactive approach to cyber security
A complete guide to penetration testingDownload now