Remote Access To Your Cloud Backups with EMC Atmos and Gladinet

Cloud Backups with EMC Atmos and Gladinet

You are the CTO or decision maker for a service provider, a school or a trusted solution provider or any company that can make good use of EMC Atmos, a low cost and scalable storage solution in the age of cloud computing. You are thinking about how to best leverage EMC Atmos for your customers, your employees or any group of users.

This article discuss a reference implementation that best leverage EMC Atmos technology and integrate EMC Atmos into user’s desktop PCs.

1 – Anywhere Access for Individual Users

The individual users can be students roaming around on and off-campus. They can also be subscribers for a Telecom service provider that want to use online storage provided by the telecom service provider. In this case, they can use Gladinet Cloud Desktop to connect to their individual EMC Atmos accounts. The Gladinet Cloud Desktop can take care of 3 individual user’s use cases:

  1. Backup files to online storage
  2. Direct access to online storage with a drive letter
  3. Keep a local folder always in sync with other PCs

We refer to this use case as the BASIC requirement as in Backup, Access, Sync for Individual Customers. Indeed, backup, access and sync are the three basic requirements for cloud storage.

2 – On-Premise Access for User Group

Another way of desktop integration is with zero desktop application installation. Instead, the integration point is at a file server. The file server will attach EMC Atmos as second tier storage to the file server itself and provide network share access to a group of users.  In this case, Gladinet CloudAFS can be installed as a file server replacement or a cloud storage gateway.

3 – Workstation Backup to EMC Atmos

Backup is the most mature use case for online storage (cloud storage). Backup is also one of the longest application on PCs and Workstations.  The combination makes it the most prominent.  In this case, Gladinet Cloud Backup can be installed on each workstation and become the background backup agent for EMC Atmos.

Source: Gladinet

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…