Quantum ATFS

Quantum ATFS

Quantum Corp. has unveiled its all-new data and storage management platform - Quantum ATFS. It is the first network-attached storage platform to integrate real-time data classification and insights with the needs of applications, determining how storage resources are allocated and consumed. Data insights enable organizations to visualize data without the constraints of a file system, automate purposeful data placement based on policies, and optimize resources using just-in-time data movement policies. The ability to support the needs of data and applications on premise or in the cloud advances Quantum’s strategy to be the leading provider of management and storage services for unstructured data anywhere.

“The engineering teams at Quantum worked with storage experts to address the many challenges IT teams face with growing storage needs. They designed an innovative and unchained solution with cutting edge technology, data provenance and analytics to provide a storage platform that works for IT, instead of IT that works for storage,” said Jeffrey McDonald, PhD, Director of Information Technology, The Hormel Institute.

Optimize Storage Resources Based on and For the Benefit of Data

Customers today are performing “unnatural acts” to manage their data – guessing at capacity and where data lives, or crawling file systems for days to find what is needed by the business. They are often uncertain about what they can delete and when they can delete it.  The results are silos of data, and a loss of control and visibility. ATFS (All-Terrain File System) meets this challenge. It is designed to ensure just-in-time purposeful placement of data, meeting the performance, resiliency, availability, and access demands of applications and workflows. As a result, ATFS delivers a consistent end user experience to deploy resources on premise or in the cloud.

By leveraging data classification, metadata and business-oriented tagging to streamline and optimize storage resource consumption, ATFS transforms storage economics, eliminating the premium organizations pay for performance. It is designed to manage hardware resources as a service to the application when and where it is needed it at scale.

“The ATFS system we have at 5 Guys Named Moe is the backbone of our extremely high bandwidth cloud data migration work,” said Eric A. Reid, head of post-production, 5 Guys Named Moe, Inc. “Using the metadata tagging built into the ATFS platform allows us to prioritize data efficiently and make sure that NVMe space is automatically allocated to the most resource intensive tasks without any manual input. This reduces costs overall while ensuring we have the right balance of storage space and high-end performance available for our workflows.”

Predictable, Consistent Performance

ATFS ingests data, which can be placed into flash, bulk or the cloud based on policies, application defined tags or manually. Performance may be tuned based on the size of the active data set. Automated policies place data “just-in-time” to support workloads while achieving greater efficiencies and improved productivity per unit of storage.

Seamless Cloud Collaboration and Data Mobility

By automating data classification and placement, ATFS serves a wide range of use cases:

Automate Application Workflows: Integrate with asset management tools, schedulers, and other applications to automate tasks using API in life sciences, media and entertainment, finance, and more.
• Active Data Retention: Metadata and tags simplify access to data over time.
• Deploy Resources in the Cloud: Burst into the cloud using cloud-based applications or use ATFS for large data set retention.
• Collaboration: Secure data sharing across the organization and externally without creating duplicates.
• Control Data: Execute on retention, protection, and access guidelines per regulations, best practices, to ensure data provenance.


Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.