Road Show With IBM and LSI in Riyadh
On storage
This is a Press Release edited by StorageNewsletter.com on March 20, 2009 at 3:52 pmThe General Marketing and Services Representative of IBM World Trade Corporation in Saudi Arabia and the business storage solution provider (IBM), held a road show in Riyadh last week to announce their cooperation with LSI Corporation, provider of silicon, systems and software technologies.
The road show was aimed at managing and optimizing the IBM storage, backup and continuity solutions for businesses in the various industries.
During the road show, IBM/LSI showcased its DS4000 and DS5000 hard drive storage systems designed to achieve best performance, security and cost-effectiveness. The systems are capable of meeting demanding open-systems requirements while establishing a new standard for life cycle longevity. The DS4000 and DS5000 storage systems are also adaptable to changes with options to add or replace host interfaces, increase capacity, adding cache and can be reconfigured to keep pace with changing demands.
The systems are designed to provide the low total cost of ownership, high performance, robust functionality, and unparalleled ease of use with the ability to change security levels on demand.
Furthermore, IBM demonstrated its capability to ensuring business continuity and enterprise besides improving efficiency and reducing complexity while minimizing risks.
New technologies such as continuous data protection, hierarchical storage management, data de-duplication and virtual tape libraries to optimize data security were also showcased during the road show. IBM’s data de-duplication technology improves backup and restore quality while at the same time reducing storage, space and power costs.
The road show also shed light on IBM’s Dynamic Infrastructure strategy, which not only enhances service levels and growth rates but also reducing business risks and optimizes storage management costs. The company’s comprehensive storage solutions work seamlessly to assure the security of sensitive data, no matter how large the application and the level of security required.