SMBs Using Cloud Storage Also High On Network-Attached Storage

SMBs Using Cloud Storage Also High On Network-Attached Storage

More than seven in ten small and medium-size businesses that use cloud-based storage solutions also use networked-attached storage (NAS), according to a newly released survey by research firm In-Stat.
This report comes close at the heels of an IBM report that said sixty percent of organizations will embrace cloud computing over the next five years. This finding was based on a survey of more than 3,000 global Chief Information Officers.

For those unaware, network-attached storage is a specialized server that is connected to a network which provides file-based data storage services to other devices on the network.  NAS systems are becoming popular for their ability to support one or more hard disk drives (HDDs). According to In-Stat, these systems sometimes boast features such as RAID (redundant array of independent disks) and back up/replication services for all the devices attached to the network.

In-Stat report titled “ Worldwide SMB Network-Attached Storage: Technology and Service Innovation Drive High Growth,” indicates that currently, SMB NAS has grabbed only a small portion of the total NAS market. However, this situation is set to change and this small portion will quickly grow to reap revenues of $2 billion by 2015.

As the market has matured, the definition of NAS has taken on additional aspects,” said Norm Bogen, VP Research. “In particular, system management software has evolved into the most important feature of NAS adoption for several reasons, but primarily because it simplifies the user experience to set up and manage NAS products.”

Findings from IBM report discussed above are also supported by research by Easynet Global Services that show cloud hosting services will be more widely used in the coming year.  A large number of companies are expected to increase their investment in the technology and according to Easynet, 49 per cent of CIOs will standardize on hosted services and other cloud applications.

By Anuradha Shukla

Sorry, comments are closed for this post.

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…