Promising Cloud Storage Start-ups for 2012

Promising Cloud Storage Start-ups for 2012

Promising Cloud Storage Start-ups for 2012

As always, storage remains an integral part of the Cloud in 2012 with a number of storage start-ups that you should an eye on. With big data set to become even bigger this new year you can see some Hadoop regulars in our list along with some other new mentions.

Check them out below:

Nimble

Set to launch its paid services in January 2012 Nimble has had a more than reasonable time to spread and create interest in the social CRM market. While it’s offering of $15 per business user may be somewhat higher than earlier hinted, this price isn’t so high as to be a complete turn-off for many SMB users. With more than 15,000 users already in the fold, it is just a matter of time before it sees profits. However, the higher than expected price per user may result in a slow down of new subscribers to the service. Nimble is still offering a free single-user version though.

Coraid

With another $50 million worth of series C funding, Coraid is set for even further expansion for its ATA-over-Ethernet network storage solutions. After its recent acquisition of Yunteq technologies, it is a safe bet that it may be on the prowl for some more related technologies to add to its services. As a unique player in the Cloud storage market that doesn’t need anything to do with TCP/IP, it is set to carve out an even larger piece of the network storage pie in 2012.

Cloudera

Although Cloudera has been on the to-be-watched list for several years now, 2012 should be the time when it goes even bigger with its Apache Hadoop-based services. As the current market leader in Hadoop-based services it looks to continue its run with even more events, talks and seminars on how Hadoop-based services can be utilized. While there seems to be a smear campaign going on from new rivals Hortonworks, Cloudera’s solid performance and variety of services should lead it clear past the hype currently being implied by its competitors. If it continues to be flexible and further innovate its product line-up this leading position will be almost guaranteed.

Kanbox

While Kanbox is another startup with some money to burn, $20 million in Series B funding to be exact, it will be doing so for China’s growing population of Cloud users. Kanbox is China’s local version of Dropbox and offers its services for both the consumer and business user through its Android app. With China looking to gain even more Cloud constituents in 2012 Kanbox are looking at a subscriber base of 8 million just for January 2012. Prospects for this startup are definitely looking rosy with even more subscribers expected along the way.

Adesto Technologies

Proving that you can still innovate in what appears to be a very much saturated market, Adesto Technologies is a startup that offers a flash memory alternative called CBRAM or Conductive Bridge RAM. While it isn’t directly involved with Cloud storage it is a the fact that its low power, low cost CMOS-based CBRAM technology will impact flash memory in a huge way. With another round of financing already closed it is set to go off in a big way come 2012.

By Muz Ismail

Sorry, comments are closed for this post.

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…