Partnership between VAST Data and Superna® Announced – View Press Release

Failover + Audit Management for a Top 200 U.S. Public Research University

  • Date: Dec 14, 2023
  • Read time: 2 minutes

CASE STUDY

Superna Provides Failover + Audit Management for Top 200 U.S. Public Research University

CHALLENGE

As an enterprise-level data centre, this client is required to have some mechanism for failover, from their production site to their disaster recovery site, to ensure consistency of service to their customers during routine maintenance or unexpected failure.

They also required a solution to automate their auditing processes for compliance purposes and to validate the management of certain files with external institutions.

SOLUTION

  • This university has been using Superna for almost 6 years, starting with the ability to automate their failover process, and eventually adopting more solutions as the opportunity arose.
  • By using Superna, they are able to automate the process to a level requiring no manual intervention at all, saving them time, money, and resources.
  • They have also greatly benefitted from Superna’s audit capabilities, not only for compliance purposes, but to support users during their day-to-day, locating lost folders, and recovering accidental file deletions and identifying the cause.

“Without a doubt, the thing that makes me most happy about using Superna is that I’m able to focus more on high-level questions, rather than small granular tasks.”

— Enterprise Systems Analyst

HIGHLIGHTS

  • Time Savings. “I can tell you just from experience, having to go through logs extensively – I no longer have to do that. I can get that information out very easily using a simple search… So that cuts that time down to a matter of minutes, which is excellent for me.“
  • Single Pane of Glass. “We use it basically as a single pane of glass. I don’t have to go to multiple different tabs or applications in order to do what I need to do – it’s all there in one place. It’s easy to read, and it’s easy to get the information I need quickly, instead of taking days.“
  • Worry-Free. “I don’t have to worry about it. I don’t have to have any other overhead, but to make sure that [Superna] is configured correctly, and that’s a pretty simple question to answer if it is.”

Want to learn more?

Want to hear firsthand how Superna’s data-first approach can help defend your file and object data from external – and even internal – threats? Click here to speak with a data protection expert.

Featured Resources

BLOGS

Emerging cyberthreats pose serious concerns for Financial Services: What your CISO needs to know

Digital transformation in the global financial services industry, along with heightened geopolitical tensions, have greatly increased the risk of cyberattack. The risk of extreme losses from cyber incidents continues to increase, having more than quadrupled since 2017 to more than $2.5 billion annually. Given the multitude of ways in which a bad actor can make their way into your network, the traditional, perimeter-based approach to data security is no longer adequate. A layered approach to data security is rapidly becoming the new gold standard for data protection.
BLOGS

Minimizing Data Risk in Healthcare: What your CISO Needs to Know

Driven by modern, machine-generated workloads typical in healthcare, the amount of unstructured data continues to grow at an astonishing pace. Complex and siloed legacy storage platforms often struggle to meet the demands of securing that data. When coupled with an industry-leading storage platform like the innovative, all-flash platforms offered by Pure Storage, Superna can help healthcare organizations achieve robust cyber resilience, informed by the best practices outlined in the NIST Cybersecurity Framework, the global benchmark for cybersecurity.
BLOGS

Multi-Layered Data Security is the New Gold Standard

Analyst firms like Gartner are recommending that organizations employ a multi-layered approach to protecting against data security threat events, breaches, ransomware, and even simple coding errors by employing active cyberstorage defense capabilities that can robustly detect and thwart attacks and other disruptions.