Increasingly competitive, you may face the challenges of surging data volumes, requiring higher data system performance, and maximizing security for data access. You can use ILM (Information Lifecycle Management) rules in practice to help reduce costs, increase storage-system availability and security, and reduce the complexity of data management.
This innovative four-step is mainly based on identity authentication, virtualization, data encryption and protection, unified management platform and other advanced technology, here with you to share the specific value characteristics:
---built-in identity recognition function: Based on the data identification function, it can realize the identity characteristic authentication and authorization management of data in the whole lifecycle of data, and help to reduce the storage cost.
---Built-in virtualization capabilities: from primary storage to archiving and protection, virtualization enables you to enjoy traditional data and new data as shared resources in different environments.
---Embedded security features: including identity management and device-level encryption to improve data usage and reliability. It is worth mentioning that this system method from the data in the application-level creation, transmission on the network, to the final deposit of the file, the data security is fully protected.
---Integrated data management Platform: Provides a common management platform for your data based on the Solaris 10 operating system. Improve the reliability, availability, utilization and value of data in future applications.
For more benefit from innovative ILM, you can visit http://cn.sun.com/storagetek/, and you can also work with us on hot topics in the data storage field, application experience, success story sharing, and more.