SHARE
Facebook X Pinterest WhatsApp

Broadcom Makes Storage Security Standard

Broadcom has unveiled storage management software that one analyst says puts the company at the forefront of vendors addressing storage security concerns. Broadcom says it has enhanced the IT security and virus/worm protection capabilities of its XelCore RAID software stack with new features such as data redundancy, secure backup, and the ability to hide a […]

Written By
thumbnail Paul Shread
Paul Shread
Jun 4, 2004
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Broadcom has unveiled storage management software that one analyst says puts the company at the forefront of vendors addressing storage security concerns.

Broadcom says it has enhanced the IT security and virus/worm protection capabilities of its XelCore RAID software stack with new features such as data redundancy, secure backup, and the ability to hide a copy of customer data from attacks against the enterprise and the network on which the data resides.

Enterprise Storage Group senior analyst Jon Oltsik calls the Broadcom offering ”very unique.”

”I think Broadcom is taking a leadership position here,” Oltsik told Enterprise Storage Forum. ”Storage security is a weak link in the security chain, and customers are starting to demand changes. Broadcom is addressing impending market demand here.”

The XelCore RAID software stack is based on Broadcom’s Fulcrum architecture, an integrated storage subsystem with integrated cache management that provides virtualization at any of the popular RAID levels, operating system independence, and hardware implementation flexibility for Broadcom’s RAID products.

Broadcom acquired the XelCore software stack and Fulcrum architecture in January as part of its acquisition of RAIDCore.

Broadcom says the XelCore stack is the only RAID solution that provides comprehensive data integrity and security through the implementation of N-way mirroring, array splitting, and array hiding. The technology allows customers to create several copies, or mirrors, of their data with N-way mirroring, and then protects the data by splitting off a mirror and hiding it from the operating system. The hidden copy of data, available for use only by trusted IT personnel, is kept as a protected backup that can be retrieved in the case of a disaster or attack.

This article was first published on EnterpriseStorageForum.com. To read the full article, click here.

  SEE ALL
ARTICLES
 
thumbnail Paul Shread

Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including an award-winning series on software-defined data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds a market analyst certification.

Recommended for you...

10 Top Storage Certifications for Data Professionals In 2024
Anina Ot
Mar 27, 2024
What is Data Compression & How Does it Work?
Kashyap Vyas
Sep 19, 2023
What Is a Data Pipeline? Examples & Types
Anina Ot
Sep 18, 2023
Top 10 Data Center Certifications
Kashyap Vyas
Aug 22, 2023
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.