Vendor Profile

Cohesity

Key Criteria for Evaluating Hybrid Cloud Data Protection

Table of Contents

  1. Summary
  2. Key Criteria Analysis
  3. Evaluation Metrics Analysis
  4. Bottom Line
  5. About Enrico Signoretti
Part 5 of 8 in a series Key Criteria for Evaluating Hybrid Cloud Data Protection Beginning

Summary

How to read this report

The Vendor profile is part of a series of documents aimed at giving the reader the tools to better understand technology, evaluate it, and explore the market to find the best solutions for his organization.

In this context, and to get a complete view of the state of the solutions available in the market, the reader should consider the following documents: :

  • Key Criteria to Evaluate Hybrid Cloud Data Protection is an introduction to the technology, defines the necessary evaluation metrics, the key criteria to evaluate new solutions, and the impact of the latter on the former. It is dedicated to those end-users that are approaching a new technology for the first time, or want an update on the latest evolution.
  • Vendor Profiles for Key Criteria are easy-to-read deep dive documents that cover a single vendor regarding the solutions described in the other reports. They provide more details on the solution, how the vendor approached the key criteria, and the impact that its solution has on the evaluation metrics. This document helps end-users to get a quick but complete evaluation of single vendors.

Overview

Defining Cohesity as a data protection vendor is very limiting. In fact, Cohesity forged a new category of solutions aimed at consolidating all secondary data available in an organization, while providing additional services on top of it. From this point of view, data protection is both an ingestion method for the data management platform and the easiest way for its customers to introduce the product in their infrastructure.

Market positioning: The benefits of Cohesity’s approach are particularly visible in large enterprise environments. Scalability, efficiency, and a rich feature set enable organizations to consolidate data easily and build a horizontal platform for all secondary data needs. The latest additions to the platform, including the integrated app ecosystem, open up several opportunities to understand and reuse data, helping to improve several processes related to data governance, security, and compliance with privacy regulations.

The solution is expensive for an SME organization when the only goal is data protection. Still, good Total Cost of Ownership (TCO) and Return on Investment (ROI) quickly come into play if the customer evaluates the solution with a broader perspective and takes into account all the data management capabilities included in the platform. For smaller customers, Cohesity has a Software as a Service (SaaS) offer now. This solution has some limitations but can be a reasonable alternative for this type of customer.

The solution is multi-tenant with a strong Role-based Access Control (RBAC) mechanism that can at the base of a self-service portal for Internet Service Providers/Managed Service Providers (ISP/MSP) customers. Standard reports on user activities are available, and the same data can be retrieved via Application Programming Interfaces (APIs) to build customized charge-back mechanisms. The solution allows organizations to build Back-up and DR-as-a-Service (DRaaS) products, but again it is real value comes from other services built upon data protection.

Deployment model: Cohesity is available as a standalone hyper-converged scale-out appliance or through hardware partners such as HPE and Cisco. The installation process is simple, while non-disruptive cluster expansions and updates contribute to simplifying operations. The same software that runs on-premise is available for major cloud providers and as a virtual appliance, giving the user the freedom of choice necessary to avoid lock-ins and implement their hybrid cloud strategy without limitation. Cohesity also offers its DataPlatform as a SaaS application for small and medium-size organizations.

Access Report

Available to GigaOm Research Subscribers

Subscribe to
GigaOm Research