Welcome!

@CloudExpo Authors: Pat Romanski, William Schmarzo, Stefana Muller, Yeshim Deniz, Elizabeth White

Related Topics: @CloudExpo

@CloudExpo: News Item

Cloud Venture Profile: Esotera Secure Storage Solutions

Esotera Secure Storage Solutions has released its Esotera suite

Esotera Secure Storage Solutions, St. John’s, NL, Canada has released its Esotera suite of distributed storage products. Founded in 2004, Esotera has developed and launched a solution that builds upon the Cloud to produce a superior storage function.

New Cloud Venture!
Esotera is a Cloud venture we have been helping position for the next main phase of their growth. Based in St Johns, Newfoundland, they are a shining example of how it's possible to create $ billion global innovations from anywhere, you don't have to be in Silicon Valley or even in a large city.

We're also putting a spotlight on them as part of our focus on the development of the Canadian Cloud industry. Our goal is to use this forum to create a cluster to further accelerate this.

InfiniDrive Cloud Storage
In a nutshell the go-to-market strategy for the product is to engage through web hosting and telco providers. With the right combination of product and service partners, the technology can underpin next-generation IaaS for popular applications like Microsoft Sharepoint and Exchange.

The reason the product will prove popular is because of the simplicity with which it solves some pretty significant issues for enterprise IT teams, in particular Business Continuity and Compliance. This is achieved through the core 'InfiniDrive' technology, that encrypts and replicates information across multiple data-centres.

It's an awesome demonstration of the key principles of what makes Cloud computing so powerful. In particular service providers have a very small product adoption step, simply drop in a number of low-cost commodity hardware servers and with little hands on work or technial skills, be up and running with their own Cloud Storage services.

The business case
Every organization accumulates unstructured data files. These may simply reside in file servers or they may be managed by an application such as Microsoft SharePoint. It is essential that they are be protected from loss or theft.

Esotera fits between your organization and server instances provisioned from the large Cloud Storage vendors such as Amazon and Google. When you save a file it is encrypted and chopped into identical, anonymous blocks that are scattered in triplicate across hundreds of Cloud Storage instances.

Security by numbers:
Unlike conventional storage systems, Esotera does not store a ‘lookup table’ to determine where the blocks are positioned. Instead, these positions are calculated on-the-fly using cryptology algorithms. Only the owner of a file who possesses the encryption key can recreate the sequence to reconstruct a file. Anyone else is faced with making random guesses in a number space of billions of billions across hundreds of service instances. Data stored within Esotera is therefore many orders of magnitude more secure than any conventional system – safer in fact that when it resides intact on your own servers where it is vulnerable to attacks through your firewall.

Instant Recovery from Disaster:
Most Cloud storage solutions work on the backup principle. A copy of your data is redundantly stored in the cloud so that it can be used to restore the state of your servers should they fail. However, even a successful data restoration shuts you down for days or weeks while all that data is pulled back across the web or shipped to you by tape.

Esotera is smarter. When you store data in the Esotera file system, you are essentially creating a primary copy in the Cloud – visible only to you. You only use your local servers as a cache for the encrypted blocks, so should your servers fail, you still have immediate access to every file. They may come in a little more slowly until your cache is refilled, but you can read any file without having to bring down your full data set.

Unlimited Scalability:
Esotera leases more Cloud resources as your need for storage grows. This creates perfect efficiency within an architecture that can grow indefinitely. As you bring more users into the Cloud storage solution, the increased number of server instances adds bandwidth and ensures that all users enjoy fast responses to their file requests. Caching of encrypted blocks occurs at two levels: On the client to ensure a file reopens quickly on that machine and on your local servers to permit files to open quickly when shared across your network.

Accountability:
Regulations exist that require you to manage your unstructured data. Files must be preserved for a specific timeframes, and proof must be provided that these files have not been tampered with. The Esotera solution keeps that data safe, provides a read-only view for external auditing and can provide message digest histories through an independent third-party to support verification of document authenticity.

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

CloudEXPO Stories
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, shared success stories from a few folks who have already started using VM-aware storage. By managing storage operations at the VM-level, they’ve been able to solve their most vexing storage problems, and create infrastructures that scale to meet the needs of their applications. Best of all, they’ve got predictable, manageable storage performance – at a level conventional storage can’t match. ...
Containers, microservices and DevOps are all the rage lately. You can read about how great they are and how they’ll change your life and the industry everywhere. So naturally when we started a new company and were deciding how to architect our app, we went with microservices, containers and DevOps. About now you’re expecting a story of how everything went so smoothly, we’re now pushing out code ten times a day, but the reality is quite different.
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and storage creates a platform for consolidation, migration and enabling digital transformation.
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully been able to harness the excess capacity of privately owned vehicles and turned into a meaningful business. This concept can be step-functioned to harnessing the spare compute capacity of smartphones that can be orchestrated by MEC to provide cloud service at the edge.