IBM snaps up Storwize

IBM snaps up Storwize
After much anticipation, IBM on Thursday announced its intent to acquire data compression vendor Storwize. Storwize, based in Marlborough, Mass., provides data compression in real-time that can reduce primary data by as much as 80%, according to company claims. The company has been successful in engaging customers such as Shopzill and Sumitomo Mitsuie Construction. Its compression technology can be used on files, VMDK golden images and structured database data without compromising performance Microsoft MCTS Training.

M&As in the IT industry for 2010

IBM will combine Storwize’s technology with its ProtecTIER deduplication appliances, its XIV disk storage and its Scale-Out NAS, as well as incorporate its functionality with IBM System Storage Easy Tier software. The software-based Storwize appliance works with heterogeneous storage from EMC, HP and NetApp.

The deal leaves one vendor, Permabit, in the independent compression business since Dell acquired Ocarina Networks last week. Permabit’s Abireo technology is OEM-focused.

Also in news last week included that Geminare launched Cloud Storage Assurance 2.0, a cloud storage replication product targeted at SMBs. Cloud Storage Assurance 2.0 now offers secure data backup and auditability through its Cloud Recovery Server Replication service. Auditability is done through authentication of data using a key identifier for each file. Cloud Assurance also allow archiving of file data automatically and provides a RESTful-base API kit that lets vendors write custom queries and integrate their document management and eDiscovery applications with Cloud Assurance Microsoft MCITP Certification.

Geminare sells Cloud Assurance through a network of service providers, MSPs and VARs. It runs Cloud Assurance on the Amazon S3, Atmos Partners or Iron Mountain Archive Service clouds.

Microsoft to issue patch for dangerous USB rootkit hole

Microsoft to issue patch for dangerous USB rootkit hole
Microsoft MCTS Training on Tuesday will release a rare out-of-band patch to fix the highly dangerous zero-day vulnerability  that has caused multiple researchers to issuing warnings earlier this month. The patch will be for all supported versions of Windows and will require a restart.

As I previously wrote about, the exploit is a whopper on all levels. It comes into the enterprise via hidden files on USB sticks or via shared network files. It requires no user interaction to infect the system (simply viewing the icon is enough to trigger it). It propagates itself. It loads as a rootkit infection. It affects all Windows operating systems, even full-patched Windows 7 systems. It seems to target extremely sensitive information — researchers say it seems to have been made for espionage. If all that weren’t scary enough, a researcher has already published proof-of-concept code.

The attack exploits a vulnerability in Windows Shell, a component of Microsoft Windows. Although many anti-virus software makers claimed that they were able to update their wares to detect the rootkit, security experts remained highly concerned about the hole, as did Microsoft MCITP Certification. In a blog post today, Christopher Budd, Sr. Security Response Communications Manager at Microsoft, explained, “we’re able to confirm that, in the past few days, we’ve seen an increase in attempts to exploit the vulnerability.”