Commvault HyperScale Software Delivers Cloud-Like Scalability, Ease-of-Use and Economics

Taneja Group Analysis

The market for scale-out data protection solutions took a step forward last week at the coming out party for HyperScale offerings at Commvault GO (the HyperScale offerings were announced last month). Commvault customers can deploy HyperScale a couple of different ways. For companies that want a turnkey solution for remote offices, Commvault offers a HyperScale Appliance. If companies need 200-300 TBs or more of backend storage, Commvault recommends they go take the software-defined route and run HyperScale Software on hardware from various storage vendors, including Cisco, HPE, Dell, Fujitsu, Lenovo, Huawei and Supermicro. Commvault provides reference architectures for each vendor to ensure customers implement the right hardware configurations and Commvault featured ScaleProtect with Cisco UCS at the event.

Though deployment flexibility is useful, the most valuable part of the Commvault HyperScale Software is the improved scalability, ease-of-use and economics HyperScale Software brings to Commvault customers. HyperScale Software gives Commvault a well-differentiated scale-out data management platform with all the bells and whistles, including erasure coding, a distributed file system (based on Red Hat GlusterFS) and advanced search/analytics (based on Lucidworks Fusion). Commvault also offers integration with multiple clouds, including AWS, Microsoft Azure, Google Cloud and Oracle Cloud. And Commvault is making workload portability a reality by providing workload migration, including hypervisor conversion, from VMware to AWS and AWS to Azure.

The Commvault HyperScale offerings have clearly been in the works for some time, given the technology partnerships, comprehensive functionality and multiple storage options. I salute Commvault for the well-thought-out HyperScale launch and look forward to hearing from Commvault customers as they evaluate HyperScale Software and the HyperScale Appliance and move closer to protecting, understanding and leveraging all their valuable data.

Leave a comment

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: