HP Named a Leader in Magic Quadrant for Midrange and High-end Modular Disk Arrays

HP Named a Leader in Magic Quadrant for Midrange and High-end Modular Disk Arrays

PALO ALTO, Calif., Dec. 5, 2011 –  HP today announced it has been named a “leader” in the latest Gartner “Magic Quadrant for Midrange and High-End Modular Disk Arrays.

An independent provider of IT and research advice, Gartner’s latest Magic Quadrant for Midrange and High-End Modular Disk Arrays assessed technology providers on their “ability to execute” and “completeness of vision.”

Clients are increasingly turning to HP Storage to optimize traditional IT and to evolve to new cloud models,” said David Scott, senior vice president and general manager, Storage, HP. “We believe Gartner’s recognition of HP as a leader in ‘completeness of vision’ affirms continued investment in our established storage platforms such as the EVA, while we also nurture our vision of HP Converged Storage ubiquitously servicing IT with products like our 3PAR and LeftHand Storage Systems.”

This year’s Gartner Midrange and High-End Modular Disk Arrays included the following HP Storage solutions:

  • HP 3PAR Storage Systems – next-generation, tier-one utility storage built for IT as a Service and designed for virtualization and the cloud. The recently introduced HP P10000 3PAR Storage Systems include powerful features for the delivery of enterprise IT within public and private clouds. HP 3PAR Storage Systems support HP Peer Motion storage federation software that enables clients to transparently move application workloads between disk systems in virtualized and cloud computing environments.
  • HP LeftHand Storage Systems – designed for environments with a variety of virtual servers, client virtualization, database, email and business applications. Built on industry-standard HP ProLiant and HP BladeSystem hardware and based on HP scale-out software and converged management.
  • HP Enterprise Virtual Array (EVA) Storage Systems – with an installed base of more than 100,000 units across thousands of data centers, the latest generation of EVA offers a proven solution for mid- to large-size companies that need enterprise storage features on a modest budget.

HP 3PAR and HP LeftHand Storage Systems are key elements of the HP Converged Storage architecture, which was designed to fundamentally change how data is accessed by integrating scale-out storage software with converged server and storage hardware platforms.

Designed to overcome the systemic failures of siloed storage designs, HP Converged Storage helps customers simplify IT and improve agility as well as efficiency in the face of unpredictable application workloads and the explosive growth of big data content.

HP Converged Storage is part of HP Converged Infrastructure, which is a core element of an Instant-On Enterprise. In a world of continuous connectivity, the Instant-On Enterprise embeds technology in everything it does to serve customers, employees, partners and citizens with everything they need, instantly.

About HP

HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. The world’s largest technology company, HP brings together a portfolio that spans printing, personal computing, software, services and IT infrastructure to solve customer problems.

More information about HP (NYSE: HPQ) is available at: http://www.hp.com.

Source: HP

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security It’s obvious that IoT can make the entire healthcare industry more efficient. The kind of data involved can be used to save time, physical energy and operating costs. Because of this, devices that facilitate medical data are becoming more commonplace in the industry. This includes things such as wearables that can track…

Zoho Announces Industry’s First Multichannel CRM Service

Zoho Announces Industry’s First Multichannel CRM Service

Zoho News According to Gartner, the Customer Relationship Management (CRM) software market grew by 12.3% from $23.4 billion in 2014 to $26.3 billion in 2015. Suggests Julian Poulter, research director at Gartner, “The merger and acquisition activity that began flowing through the market in 2009 continued in 2015, with more than 30 notable acquisitions. This…

How The Cloud Is Changing Online Education

How The Cloud Is Changing Online Education

Online Education Growth There’s no doubt that the internet has changed the face of education over the last two decades. In fact, by some estimates more than 80 percent of college students expect to take at least some — if not all of their courses — online. Thousands of people have earned degrees without ever…

Investing In The Future With The Introduction of Sage Cloud

Investing In The Future With The Introduction of Sage Cloud

CHICAGO, IL–(Marketwired – Jul 26, 2016) – Sage, a market leader in cloud accounting software, announced today at Sage Summit 2016 its strong commitment to future technologies, with a focus on new and existing partnerships that power business growth. Revealed during CEO Stephen Kelly’s keynote address, which opened the world’s largest gathering of entrepreneurs and…

Cloud Proofing Future Business Challenges

Cloud Proofing Future Business Challenges

Coping with Cloud Challenges Hardly a week goes by without coming across news around the increase in the number of organizations moving their workloads to public clouds. In the digital world, embracing cloud is a fundamental requirement for engaging customers and conducting business at scale. Due to a multitude of factors, including compliance mandates, risk…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…