{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"ru":"Продукты","_type":"localeString","en":"Products","de":"die produkte"},"introduction-popover":{"en":"introduction","ru":"внедрения","_type":"localeString"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"_type":"localeString","en":"Update profile","ru":"Обновить профиль"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"user-implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"categories":{"_type":"localeString","en":"Categories","ru":"Компетенции"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"en":"Partnership with vendors","ru":"Партнерство с производителями","_type":"localeString"},"partnership-suppliers":{"_type":"localeString","en":"Partnership with suppliers","ru":"Партнерство с поставщиками"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"_type":"localeString","en":"Country","ru":"Страна"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"_type":"localeString","en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки"},"additional-advantages":{"_type":"localeString","en":"Additional Benefits","ru":"Дополнительные преимущества"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"ru":"Сертификация технических специалистов","_type":"localeString","en":"Certification of technical specialists"},"sales-plan":{"en":"Annual Sales Plan","ru":"Годовой план продаж","_type":"localeString"},"partners-vendors":{"_type":"localeString","en":"Partners-vendors","ru":"Партнеры-производители"},"partners-suppliers":{"en":"Partners-suppliers","ru":"Партнеры-поставщики","_type":"localeString"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"_type":"localeString","en":"Produced products","ru":"Производимые продукты"},"vendor-implementations":{"_type":"localeString","en":"Produced deployments","ru":"Производимые внедрения"},"supplier-implementations":{"en":"Supplied deployments","ru":"Поставляемые внедрения","_type":"localeString"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"en":"ROI4CIO: Company","ru":"ROI4CIO: Компания","_type":"localeString"},"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"title","translations":{"ru":"Компания","_type":"localeString","en":"Company"}},{"translations":{"en":"Company description","ru":"Описание компании","_type":"localeString"},"name":"description"},{"name":"keywords","translations":{"_type":"localeString","en":"Company keywords","ru":"Ключевые слова для компании"}}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"nutanix":{"id":3344,"title":"Nutanix","logoURL":"https://old.roi4cio.com/uploads/roi/company/Nutanix.png","alias":"nutanix","address":"","roles":[{"id":2,"type":"supplier"},{"id":3,"type":"vendor"}],"description":"<span lang=\"en\"><span style=\"font-weight: bold;\">Nutanix </span>is an American company that develops hardware and software systems, as well as software for building a hyperconverged infrastructure based on servers of standard architecture (x86). Founded in 2009 in San Jose, California, by a group of former Google, Facebook and Amazon employees. The first shipments to the market of the main product Nutanix Virtual Computing Platform (VCP) date back to 2011. The company is widely represented in Europe, USA, Asia, Latin America. </span>\r\n<span lang=\"en\">The VCP complex is a server cluster of х86-servers (nodes) under the control of one of the popular hypervisors - VMware ESX, Microsoft Hyper-V or Nutanix Acropolis. Computing and storage resources are pooled using the proprietary Nutanix Operating System (NOS) software platform. One of its components is a special virtual machine called Controller VM (CVM), which handles all I/O of the hypervisor and other virtual machines on the host.When running as part of a cluster, NOS creates a Nutanix Distributed Filesystem (NDFS) software-defined storage environment. which is available to hypervisors as NFS, iSCSI storage or Server Message Block. The company supplies both ready-made hardware and software hyperconverged systems, and separately software. Nutanix software platform is used to build their hyperconverged solutions by a number of global manufacturers, for example, Lenovo, Dell EMC and others.</span> ","companyTypes":["supplier","vendor"],"products":{},"vendoredProductsCount":3,"suppliedProductsCount":3,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{"509":{"id":509,"title":"Converged and Hyper Converged System","description":" Converged and hyper convergent infrastructures simplify support for virtual desktop infrastructure and desktop virtualization, as they are designed to be easy to install and perform complex tasks.\r\nConvergent infrastructure combines the four main components of a data center in one package: computing devices, storage devices, network devices, and server virtualization tools. Hyper-converged infrastructure allows for tighter integration of a larger number of components using software tools.\r\nIn both convergent and hyper-convergent infrastructure, all elements are compatible with each other. Thanks to this, you will be able to purchase the necessary storage devices and network devices for your company at a time, and they, as you know, are of great importance in the virtual desktops infrastructure. This allows you to simplify the process of deploying such an infrastructure - something that has been waiting for and what will be rejoiced by many companies that need to virtualize their desktop systems.\r\nDespite its value and innovation, there are several questions to these technologies regarding their intended use and differences. Let's try to figure out what functionality offers converged and hyper-convergent infrastructures and how they differ.","materialsDescription":" <span style=\"font-weight: bold;\">What is converged infrastructure?</span>\r\nConvergent infrastructure combines computing devices, storage, network devices and server virtualization tools in one chassis so that they can be managed from one place. Management capabilities may include the management of virtual desktop infrastructure, depending on the selected configuration and manufacturer.\r\nThe hardware included in the bundled converged infrastructure is pre-configured to support any targets: virtual desktop infrastructures, databases, special applications, and so on. But in fact, you do not have enough freedom to change the selected configuration.\r\nRegardless of the method chosen for extending the virtual desktop infrastructure environment, you should understand that subsequent vertical scaling will be costly and time-consuming. Adding individual components is becoming complex and depriving you of the many benefits of a converged infrastructure. Adding workstations and expanding storage capacity in a corporate infrastructure can be just as expensive, which suggests the need for proper planning for any virtual desktop infrastructure deployment.\r\nOn the other hand, all components of a converged infrastructure can work for a long time. For example, a complete server of such infrastructure works well even without the rest of the infrastructure components.\r\n<span style=\"font-weight: bold;\">What is a hyper-convergent infrastructure?</span>\r\nThe hyper-converged infrastructure was built on the basis of converged infrastructure and the concept of a software-defined data center. It combines all the components of the usual data center in one system. All four key components of the converged infrastructure are in place, but sometimes it also includes additional components, such as backup software, snapshot capabilities, data deduplication functionality, intermediate compression, global network optimization (WAN), and much more. Convergent infrastructure relies primarily on hardware, and software-defined data center often adapts to any hardware. In the hyper-convergent infrastructure, these two possibilities are combined.\r\nHyper-converged infrastructure is supported by one supplier. It can be managed as a single system with a single set of tools. To expand the infrastructure, you just need to install blocks of necessary devices and resources (for example, storage) into the main system block. And this is done literally on the fly.\r\nSince the hyper-convergent infrastructure is software-defined (that is, the operation of the infrastructure is logically separated from the physical equipment), the mutual integration of components is denser than in a conventional converged infrastructure, and the components themselves must be nearby to work correctly. This makes it possible to use a hyper-convergent infrastructure to support even more workloads than in the case of conventional converged infrastructure. This is explained by the fact that it has the possibility of changing the principle of definition and adjustment at the program level. In addition, you can make it work with specialized applications and workloads, which pre-configured converged infrastructures do not allow.\r\nHyper-converged infrastructure is especially valuable for working with a virtual desktop infrastructure because it allows you to scale up quickly without additional costs. Often, in the case of the classic virtual desktops infrastructure, things are completely different - companies need to buy more resources before scaling or wait for virtual desktops to use the allocated space and network resources, and then, in fact, add new infrastructure.\r\nBoth scenarios require significant time and money. But, in the case of hyperconvergent infrastructure, if you need to expand the storage, you can simply install the required devices in the existing stack. Scaling can be done quickly — for the time required to deliver the equipment. In this case, you do not have to go through the full procedure of re-evaluation and reconfiguration of the corporate infrastructure.\r\nIn addition, when moving from physical PCs to virtual workstations, you will need devices to perform all the computational tasks that laptops and PCs typically perform. Hyper-converged infrastructure will greatly help with this, as it often comes bundled with a large amount of flash memory, which has a positive effect on the performance of virtual desktops. This increases the speed of I / O operations, smoothes work under high loads, and allows you to perform scanning for viruses and other types of monitoring in the background (without distracting users).\r\nThe flexibility of the hyper-converged infrastructure makes it more scalable and cost-effective compared to the convergent infrastructure since it has the ability to add computing and storage devices as needed. The cost of the initial investment for both infrastructures is high, but in the long term, the value of the investment should pay off.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Converged_and_Hyper_Converged_System.png","alias":"converged-and-hyper-converged-system"}},"branches":"Information Technology","companyUrl":"https://www.nutanix.com/","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":true,"presenterCodeLng":"","seo":{"title":"Nutanix","keywords":"Nutanix, infrastructure, that, consumer-grade, natively, engineering, design, leverages","description":"<span lang=\"en\"><span style=\"font-weight: bold;\">Nutanix </span>is an American company that develops hardware and software systems, as well as software for building a hyperconverged infrastructure based on servers of standard architecture (x86). Founded in 2","og:title":"Nutanix","og:description":"<span lang=\"en\"><span style=\"font-weight: bold;\">Nutanix </span>is an American company that develops hardware and software systems, as well as software for building a hyperconverged infrastructure based on servers of standard architecture (x86). Founded in 2","og:image":"https://old.roi4cio.com/uploads/roi/company/Nutanix.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[{"id":3390,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Nutanix_Mine.png","logo":true,"scheme":false,"title":"Nutanix Mine","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nutanix-mine","companyTitle":"Nutanix","companyTypes":["supplier","vendor"],"companyId":3344,"companyAlias":"nutanix","description":"Nutanix Mine provides a single platform for organizations experiencing the benefits of Nutanix Enterprise OS, as these organizations can simply extend their existing integrated data protection to include secondary data backup and archiving all in a turnkey backup solution powered by our platform partners.\r\nWith built-in data protection, security and intelligent data management, Mine enables enterprises to choose the best data back-up software for their organization, and eliminate the time and expense of configuring standalone secondary storage solutions.\r\n<ul><li>Embracing an open platform strategy, Nutanix Mine is a turnkey solution from Nutanix that integrates with popular back-up solutions, including those from Veeam, HYCU, Commvault, Veritas, and Unitrends.</li><li>Nutanix Mine provides data protection for all your workloads, not just those applications running on Nutanix AOS.</li></ul>\r\nThrough tight integration with Nutanix’s HCI data fabric and advanced Prism management console, with Nutanix Mine, datacenter managers can rely on a single pane of glass to manage their HCI infrastructure and secondary storage.\r\n<ul><li>A single integrated pane to monitor the health of on-premises infrastructure as well as back-up storage.</li><li>Easily remediate plan and your storage runway and capacity.</li><li>The ability to easily scale-out both primary and secondary storage to accommodate business growth.</li></ul>\r\nNutanix Mine is a complete turn-key solution, that includes a full-stack hypervisor, hardware, platform OS, management, storage and support. Initial sizing can be done via Nutanix Sizer and product procurement and installations are streamlined.\r\n<ul><li>Licenses for Nutanix AOS Pro and back-up vendor software are bundled into the Nutanix Mine solution.</li><li>Complements Nutanix’s native storage services for unstructured data, which includes Nutanix Files for file-based storage, and Nutanix Buckets delivering a scalable S3-compliant object store.</li><li>Latest generation high-density HDDs. Configuration optimized for data protection.</li></ul>","shortDescription":"Meet all of your enterprise data availability requirements with a single turnkey platform Nutanix Mine.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Nutanix Mine","keywords":"","description":"Nutanix Mine provides a single platform for organizations experiencing the benefits of Nutanix Enterprise OS, as these organizations can simply extend their existing integrated data protection to include secondary data backup and archiving all in a turnkey bac","og:title":"Nutanix Mine","og:description":"Nutanix Mine provides a single platform for organizations experiencing the benefits of Nutanix Enterprise OS, as these organizations can simply extend their existing integrated data protection to include secondary data backup and archiving all in a turnkey bac","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Nutanix_Mine.png"},"eventUrl":"","translationId":3391,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":301,"title":"Storage Software","alias":"storage-software","description":"Sooner or later, your small business will need more space for data storage. Information in the form of e-mails, documents, presentations, databases, graphics, audio files and spreadsheets is the lifeblood of most companies, and the applications that run and protect your business require a lot of disk space. In addition, a number of trends are fueling our growing hunger for storage:\r\n<ul><li>Recent government regulations, such as Sarbanes-Oxley, require businesses to maintain and back up a variety of data they might have otherwise deleted.</li><li>For legal reasons, many small businesses are now archiving e-mail messages dating back five or more years.</li><li>The pervasiveness of viruses and spyware requires ever-more vigilant backups--which requires ever-more storage capacity.</li><li>Each new version of a software application or operating system demands more hard-drive real estate than its predecessor.</li><li>The growing need to store large media files, such as video, and make them available to users on a network is generating demand for more sophisticated storage solutions.</li></ul>\r\nStoring information and managing its storage is critical to a company's behind-the-scenes success. Fortunately, there are many storage solutions software available.\r\n<span style=\"font-weight: bold; \">Online storage or Cloud Storage. </span>Cloud storage is storage space on commercial data center accessible from any computer with Internet access. Data storage programs are usually provided by a service provider. A limited storage space may be provided free with more space available for a subscription fee. Examples of service providers are Amazon S3, Google Drive, Sky Drive etc. \r\nBy backing up your most important files to a secure, remote server, you're protecting the data stored at your place of business. With cloud storage management software you can easily share large files with clients, partners and others by providing them with password-protected access to your online storage service, thereby eliminating the need to e-mail those large files. \r\n<span style=\"font-weight: bold; \">Network-attached storage software.</span>Network-attached storage (NAS) provides fast, simple, reliable access to data in an IP networking environment. Those storage software solutions can also offload file serving from other servers on your network, thereby increasing performance. A network storage software system allows you to consolidate storage, thereby increasing efficiency and reducing costs; simplify storage administration and data backup and recovery; and allow for easy scaling to meet growing storage requirements.\r\n<span style=\"font-weight: bold; \">Storage virtualization software.</span>The management of storage and data is becoming difficult and time consuming. Storage management tools helps to address this problem by facilitating easy backup, archiving and recovery tasks by consuming less time. Storage virtualization aggregates the functions and hides the actual complexity of the storage area network (SAN).\r\nStorage virtualization can be applied to any level of a SAN. The virtualization techniques can also be applied to different storage functions such as physical storage, RAID groups, logical unit numbers (LUNs), LUN subdivisions, storage zones and logical volumes, etc. ","materialsDescription":"<h1 class=\"align-center\"> Things You Need to Know About Data Storage Management</h1>\r\n<span style=\"font-weight: bold; \">Know your data.</span> When formulating your data storage management policy, ask the following questions:\r\n<ul><li>How soon do I need the data back if lost?</li><li>How fast do I need to access the data?</li><li>How long do I need to retain data?</li><li>How secure does it need to be?</li><li>What regulatory requirements need to be adhered to?</li></ul>\r\n<span style=\"font-weight: bold; \">Don't neglect unstructured data.</span>Think about how you might want to combine multi-structured data from your transactional systems with semi-structured or unstructured data from your email servers, network file systems, etc.\r\n<span style=\"font-weight: bold; \">Establish a data retention policy.</span> Setting the right data retention policies is a necessity for both internal data governance and legal compliance.\r\n<span style=\"font-weight: bold; \">Look for a solution that fits your data, not the other way around.</span> The storage and backup solutions you choose should be optimized for mobile and virtual platforms, in addition to desktops and laptops -- and provide a consistent experience across any platform, including mobile editing capabilities and intuitive experience across mobile devices, virtual desktops or desktops.\r\n<span style=\"font-weight: bold; \">Make sure your data is secure.</span> When managing data within any IT environment,software storage's security has to be the first priority. The data also needs to be encrypted so it cannot be read or used by unscrupulous third parties if it ever falls out of possession or is hacked (which does happen).\r\n<h1 class=\"align-center\">What is Self-Storage Software?</h1>\r\nA typical self-storage management software is a system that provides ability to manage storage units and their state (available, rented, reserved or disabled), customers with their balance and reporting. Self-storage management software can also have additional features such as point of sale, customer notes, digital signature, insurance, payment processing, accounting, etc.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Storage_Software__1_.png"},{"id":697,"title":"Backup Administration","alias":"backup-administration","description":" Nowadays, information, along with human capital, is the most valuable asset of every enterprise. The backup system administration is an integral part of data and IT system security structure. It is the backup process quality and method that determine whether in the case of a system failure or data loss it will be possible to maintain functionality and continuity of the enterprise’s operations. This is why careful creation of backup copies is so important.\r\nCreating backup copies may be burdensome and very expensive and time-consuming when you do it all by yourself. On the other hand, the automation of the process introduces a range of improvements, saves time and eliminate the risk of data loss. The copies are created automatically and are protected against interference by third parties. The network administrator is capable of remote backup system management, validity monitoring of created copies as well as retrieving lost information.","materialsDescription":" <span style=\"font-weight: bold;\">The need for backup: when will help out the backup scheme?</span>\r\n<span style=\"font-weight: bold;\">Data corruption</span>\r\nThe need to create a backup is most obvious in the case when your data may undergo damage - physical destruction or theft of the carrier, virus attack, accidental and/or illegal changes, etc.\r\nA working backup plan will allow you to return your data in the event of any failure or accident without the cost and complexity.\r\n<span style=\"font-weight: bold;\">Copying information, creating mirrors</span>\r\nA less obvious option for using the backup scheme is to automatically create copies of data not for storage, but for use: cloning and mirroring databases, web sites, work projects, etc.\r\nThe backup scheme does not define what, where and why to copy - use backup as a cloning tool.\r\n<span style=\"font-weight: bold;\">Test, training and debugging projects</span>\r\nA special case of data cloning is the creation of a copy of working information in order to debug, improve or study its processing system. You can create a copy of your website or database using the backup instructions to make and debug any changes.\r\nThe need for backing up training and debugging versions of information is all the more high because the changes you make often lead to data loss.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Backup_Administration.png"},{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6759,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/1.png","logo":true,"scheme":false,"title":"Nutanix Enterprise Cloud","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nutanix-enterprise-cloud","companyTitle":"Nutanix","companyTypes":["supplier","vendor"],"companyId":3344,"companyAlias":"nutanix","description":"Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped.<br /><br />Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped. The solution innovative combines components that create a solution together, delivering new levels of flexibility, reliability and performance.<br /><br />The hardware platform is represented by unified x86 servers (nodes), the configuration of which is selected in such a way as to best suit a specific type of customer's tasks. The minimum configuration is three standard nodes, to which you can add any number of new nodes as needed. At the same time, thanks to the use of a proprietary software package, the integration of new servers, respectively, an increase in power, performance and capacity of the system occurs automatically, without interrupting work.<br /><br />Dedicated software enables deep virtualization of compute and storage resources, providing the highest degree of flexibility and manageability across the Nutanix platform.<br /><br /><span style=\"font-weight: bold;\">Simplification and unification of IT infrastructure</span><br />Nutanix Enterprise Cloud dramatically simplifies virtual machine deployments. Consolidation of computing power and storage devices on a single software platform allows IT professionals to quickly and easily deploy new VMs.<br /><br /><span style=\"font-weight: bold;\">Reduced IT costs</span><br />Eliminate costly and difficult-to-maintain networked storage systems to reduce capital and operating expenses. With its unprecedented post-deployment virtual machine capability, Nutanix provides a simple, modular approach to building a modern data center.<br /><br /><span style=\"font-weight: bold;\">Equipping the central office and remote branches</span><br />The platform is suitable for the implementation of almost any task at the level of not only the central data center, but also branches. Ideal for on-premises application deployment, VDI, file services, DHCP and DNS printing, WAN optimization, and security-focused virtual appliances.","shortDescription":"Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Nutanix Enterprise Cloud","keywords":"","description":"Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped.<br /><br />Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equip","og:title":"Nutanix Enterprise Cloud","og:description":"Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped.<br /><br />Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equip","og:image":"https://old.roi4cio.com/fileadmin/user_upload/1.png"},"eventUrl":"","translationId":6759,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":509,"title":"Converged and Hyper Converged System","alias":"converged-and-hyper-converged-system","description":" Converged and hyper convergent infrastructures simplify support for virtual desktop infrastructure and desktop virtualization, as they are designed to be easy to install and perform complex tasks.\r\nConvergent infrastructure combines the four main components of a data center in one package: computing devices, storage devices, network devices, and server virtualization tools. Hyper-converged infrastructure allows for tighter integration of a larger number of components using software tools.\r\nIn both convergent and hyper-convergent infrastructure, all elements are compatible with each other. Thanks to this, you will be able to purchase the necessary storage devices and network devices for your company at a time, and they, as you know, are of great importance in the virtual desktops infrastructure. This allows you to simplify the process of deploying such an infrastructure - something that has been waiting for and what will be rejoiced by many companies that need to virtualize their desktop systems.\r\nDespite its value and innovation, there are several questions to these technologies regarding their intended use and differences. Let's try to figure out what functionality offers converged and hyper-convergent infrastructures and how they differ.","materialsDescription":" <span style=\"font-weight: bold;\">What is converged infrastructure?</span>\r\nConvergent infrastructure combines computing devices, storage, network devices and server virtualization tools in one chassis so that they can be managed from one place. Management capabilities may include the management of virtual desktop infrastructure, depending on the selected configuration and manufacturer.\r\nThe hardware included in the bundled converged infrastructure is pre-configured to support any targets: virtual desktop infrastructures, databases, special applications, and so on. But in fact, you do not have enough freedom to change the selected configuration.\r\nRegardless of the method chosen for extending the virtual desktop infrastructure environment, you should understand that subsequent vertical scaling will be costly and time-consuming. Adding individual components is becoming complex and depriving you of the many benefits of a converged infrastructure. Adding workstations and expanding storage capacity in a corporate infrastructure can be just as expensive, which suggests the need for proper planning for any virtual desktop infrastructure deployment.\r\nOn the other hand, all components of a converged infrastructure can work for a long time. For example, a complete server of such infrastructure works well even without the rest of the infrastructure components.\r\n<span style=\"font-weight: bold;\">What is a hyper-convergent infrastructure?</span>\r\nThe hyper-converged infrastructure was built on the basis of converged infrastructure and the concept of a software-defined data center. It combines all the components of the usual data center in one system. All four key components of the converged infrastructure are in place, but sometimes it also includes additional components, such as backup software, snapshot capabilities, data deduplication functionality, intermediate compression, global network optimization (WAN), and much more. Convergent infrastructure relies primarily on hardware, and software-defined data center often adapts to any hardware. In the hyper-convergent infrastructure, these two possibilities are combined.\r\nHyper-converged infrastructure is supported by one supplier. It can be managed as a single system with a single set of tools. To expand the infrastructure, you just need to install blocks of necessary devices and resources (for example, storage) into the main system block. And this is done literally on the fly.\r\nSince the hyper-convergent infrastructure is software-defined (that is, the operation of the infrastructure is logically separated from the physical equipment), the mutual integration of components is denser than in a conventional converged infrastructure, and the components themselves must be nearby to work correctly. This makes it possible to use a hyper-convergent infrastructure to support even more workloads than in the case of conventional converged infrastructure. This is explained by the fact that it has the possibility of changing the principle of definition and adjustment at the program level. In addition, you can make it work with specialized applications and workloads, which pre-configured converged infrastructures do not allow.\r\nHyper-converged infrastructure is especially valuable for working with a virtual desktop infrastructure because it allows you to scale up quickly without additional costs. Often, in the case of the classic virtual desktops infrastructure, things are completely different - companies need to buy more resources before scaling or wait for virtual desktops to use the allocated space and network resources, and then, in fact, add new infrastructure.\r\nBoth scenarios require significant time and money. But, in the case of hyperconvergent infrastructure, if you need to expand the storage, you can simply install the required devices in the existing stack. Scaling can be done quickly — for the time required to deliver the equipment. In this case, you do not have to go through the full procedure of re-evaluation and reconfiguration of the corporate infrastructure.\r\nIn addition, when moving from physical PCs to virtual workstations, you will need devices to perform all the computational tasks that laptops and PCs typically perform. Hyper-converged infrastructure will greatly help with this, as it often comes bundled with a large amount of flash memory, which has a positive effect on the performance of virtual desktops. This increases the speed of I / O operations, smoothes work under high loads, and allows you to perform scanning for viruses and other types of monitoring in the background (without distracting users).\r\nThe flexibility of the hyper-converged infrastructure makes it more scalable and cost-effective compared to the convergent infrastructure since it has the ability to add computing and storage devices as needed. The cost of the initial investment for both infrastructures is high, but in the long term, the value of the investment should pay off.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Converged_and_Hyper_Converged_System.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":691,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Nutanix_Prism.jpg","logo":true,"scheme":false,"title":"Nutanix Prism","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nutanix-prism","companyTitle":"Nutanix","companyTypes":["supplier","vendor"],"companyId":3344,"companyAlias":"nutanix","description":"Nutanix Prism Benefits:\r\nSimplified workflows with rich built-in automation\r\nConsumer-grade experience with one-click simplicity\r\nCentralized solution for infrastructure management and everyday operations\r\n\r\nOne-click\r\nInfrastructure Management - Centralized infrastructure management all the way up to virtual machines.\r\nOperational Insights - Rich insights and proactive recommendations about day to day operations.\r\nPlanning - Intelligent insights into capacity usage with precise optimization recommendations.","shortDescription":"Nutanix Prism gives administrators a simple and elegant way to manage virtual environments. Powered by advanced data analytics and heuristics, Prism simplifies and streamlines common workflows within a datacenter eliminating the need to have disparate management solutions.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Nutanix Prism","keywords":"with, management, insights, infrastructure, operations, Nutanix, recommendations, Centralized","description":"Nutanix Prism Benefits:\r\nSimplified workflows with rich built-in automation\r\nConsumer-grade experience with one-click simplicity\r\nCentralized solution for infrastructure management and everyday operations\r\n\r\nOne-click\r\nInfrastructure Management - Centralized i","og:title":"Nutanix Prism","og:description":"Nutanix Prism Benefits:\r\nSimplified workflows with rich built-in automation\r\nConsumer-grade experience with one-click simplicity\r\nCentralized solution for infrastructure management and everyday operations\r\n\r\nOne-click\r\nInfrastructure Management - Centralized i","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Nutanix_Prism.jpg"},"eventUrl":"","translationId":692,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[{"id":3390,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Nutanix_Mine.png","logo":true,"scheme":false,"title":"Nutanix Mine","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nutanix-mine","companyTitle":"Nutanix","companyTypes":["supplier","vendor"],"companyId":3344,"companyAlias":"nutanix","description":"Nutanix Mine provides a single platform for organizations experiencing the benefits of Nutanix Enterprise OS, as these organizations can simply extend their existing integrated data protection to include secondary data backup and archiving all in a turnkey backup solution powered by our platform partners.\r\nWith built-in data protection, security and intelligent data management, Mine enables enterprises to choose the best data back-up software for their organization, and eliminate the time and expense of configuring standalone secondary storage solutions.\r\n<ul><li>Embracing an open platform strategy, Nutanix Mine is a turnkey solution from Nutanix that integrates with popular back-up solutions, including those from Veeam, HYCU, Commvault, Veritas, and Unitrends.</li><li>Nutanix Mine provides data protection for all your workloads, not just those applications running on Nutanix AOS.</li></ul>\r\nThrough tight integration with Nutanix’s HCI data fabric and advanced Prism management console, with Nutanix Mine, datacenter managers can rely on a single pane of glass to manage their HCI infrastructure and secondary storage.\r\n<ul><li>A single integrated pane to monitor the health of on-premises infrastructure as well as back-up storage.</li><li>Easily remediate plan and your storage runway and capacity.</li><li>The ability to easily scale-out both primary and secondary storage to accommodate business growth.</li></ul>\r\nNutanix Mine is a complete turn-key solution, that includes a full-stack hypervisor, hardware, platform OS, management, storage and support. Initial sizing can be done via Nutanix Sizer and product procurement and installations are streamlined.\r\n<ul><li>Licenses for Nutanix AOS Pro and back-up vendor software are bundled into the Nutanix Mine solution.</li><li>Complements Nutanix’s native storage services for unstructured data, which includes Nutanix Files for file-based storage, and Nutanix Buckets delivering a scalable S3-compliant object store.</li><li>Latest generation high-density HDDs. Configuration optimized for data protection.</li></ul>","shortDescription":"Meet all of your enterprise data availability requirements with a single turnkey platform Nutanix Mine.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Nutanix Mine","keywords":"","description":"Nutanix Mine provides a single platform for organizations experiencing the benefits of Nutanix Enterprise OS, as these organizations can simply extend their existing integrated data protection to include secondary data backup and archiving all in a turnkey bac","og:title":"Nutanix Mine","og:description":"Nutanix Mine provides a single platform for organizations experiencing the benefits of Nutanix Enterprise OS, as these organizations can simply extend their existing integrated data protection to include secondary data backup and archiving all in a turnkey bac","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Nutanix_Mine.png"},"eventUrl":"","translationId":3391,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":301,"title":"Storage Software","alias":"storage-software","description":"Sooner or later, your small business will need more space for data storage. Information in the form of e-mails, documents, presentations, databases, graphics, audio files and spreadsheets is the lifeblood of most companies, and the applications that run and protect your business require a lot of disk space. In addition, a number of trends are fueling our growing hunger for storage:\r\n<ul><li>Recent government regulations, such as Sarbanes-Oxley, require businesses to maintain and back up a variety of data they might have otherwise deleted.</li><li>For legal reasons, many small businesses are now archiving e-mail messages dating back five or more years.</li><li>The pervasiveness of viruses and spyware requires ever-more vigilant backups--which requires ever-more storage capacity.</li><li>Each new version of a software application or operating system demands more hard-drive real estate than its predecessor.</li><li>The growing need to store large media files, such as video, and make them available to users on a network is generating demand for more sophisticated storage solutions.</li></ul>\r\nStoring information and managing its storage is critical to a company's behind-the-scenes success. Fortunately, there are many storage solutions software available.\r\n<span style=\"font-weight: bold; \">Online storage or Cloud Storage. </span>Cloud storage is storage space on commercial data center accessible from any computer with Internet access. Data storage programs are usually provided by a service provider. A limited storage space may be provided free with more space available for a subscription fee. Examples of service providers are Amazon S3, Google Drive, Sky Drive etc. \r\nBy backing up your most important files to a secure, remote server, you're protecting the data stored at your place of business. With cloud storage management software you can easily share large files with clients, partners and others by providing them with password-protected access to your online storage service, thereby eliminating the need to e-mail those large files. \r\n<span style=\"font-weight: bold; \">Network-attached storage software.</span>Network-attached storage (NAS) provides fast, simple, reliable access to data in an IP networking environment. Those storage software solutions can also offload file serving from other servers on your network, thereby increasing performance. A network storage software system allows you to consolidate storage, thereby increasing efficiency and reducing costs; simplify storage administration and data backup and recovery; and allow for easy scaling to meet growing storage requirements.\r\n<span style=\"font-weight: bold; \">Storage virtualization software.</span>The management of storage and data is becoming difficult and time consuming. Storage management tools helps to address this problem by facilitating easy backup, archiving and recovery tasks by consuming less time. Storage virtualization aggregates the functions and hides the actual complexity of the storage area network (SAN).\r\nStorage virtualization can be applied to any level of a SAN. The virtualization techniques can also be applied to different storage functions such as physical storage, RAID groups, logical unit numbers (LUNs), LUN subdivisions, storage zones and logical volumes, etc. ","materialsDescription":"<h1 class=\"align-center\"> Things You Need to Know About Data Storage Management</h1>\r\n<span style=\"font-weight: bold; \">Know your data.</span> When formulating your data storage management policy, ask the following questions:\r\n<ul><li>How soon do I need the data back if lost?</li><li>How fast do I need to access the data?</li><li>How long do I need to retain data?</li><li>How secure does it need to be?</li><li>What regulatory requirements need to be adhered to?</li></ul>\r\n<span style=\"font-weight: bold; \">Don't neglect unstructured data.</span>Think about how you might want to combine multi-structured data from your transactional systems with semi-structured or unstructured data from your email servers, network file systems, etc.\r\n<span style=\"font-weight: bold; \">Establish a data retention policy.</span> Setting the right data retention policies is a necessity for both internal data governance and legal compliance.\r\n<span style=\"font-weight: bold; \">Look for a solution that fits your data, not the other way around.</span> The storage and backup solutions you choose should be optimized for mobile and virtual platforms, in addition to desktops and laptops -- and provide a consistent experience across any platform, including mobile editing capabilities and intuitive experience across mobile devices, virtual desktops or desktops.\r\n<span style=\"font-weight: bold; \">Make sure your data is secure.</span> When managing data within any IT environment,software storage's security has to be the first priority. The data also needs to be encrypted so it cannot be read or used by unscrupulous third parties if it ever falls out of possession or is hacked (which does happen).\r\n<h1 class=\"align-center\">What is Self-Storage Software?</h1>\r\nA typical self-storage management software is a system that provides ability to manage storage units and their state (available, rented, reserved or disabled), customers with their balance and reporting. Self-storage management software can also have additional features such as point of sale, customer notes, digital signature, insurance, payment processing, accounting, etc.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Storage_Software__1_.png"},{"id":697,"title":"Backup Administration","alias":"backup-administration","description":" Nowadays, information, along with human capital, is the most valuable asset of every enterprise. The backup system administration is an integral part of data and IT system security structure. It is the backup process quality and method that determine whether in the case of a system failure or data loss it will be possible to maintain functionality and continuity of the enterprise’s operations. This is why careful creation of backup copies is so important.\r\nCreating backup copies may be burdensome and very expensive and time-consuming when you do it all by yourself. On the other hand, the automation of the process introduces a range of improvements, saves time and eliminate the risk of data loss. The copies are created automatically and are protected against interference by third parties. The network administrator is capable of remote backup system management, validity monitoring of created copies as well as retrieving lost information.","materialsDescription":" <span style=\"font-weight: bold;\">The need for backup: when will help out the backup scheme?</span>\r\n<span style=\"font-weight: bold;\">Data corruption</span>\r\nThe need to create a backup is most obvious in the case when your data may undergo damage - physical destruction or theft of the carrier, virus attack, accidental and/or illegal changes, etc.\r\nA working backup plan will allow you to return your data in the event of any failure or accident without the cost and complexity.\r\n<span style=\"font-weight: bold;\">Copying information, creating mirrors</span>\r\nA less obvious option for using the backup scheme is to automatically create copies of data not for storage, but for use: cloning and mirroring databases, web sites, work projects, etc.\r\nThe backup scheme does not define what, where and why to copy - use backup as a cloning tool.\r\n<span style=\"font-weight: bold;\">Test, training and debugging projects</span>\r\nA special case of data cloning is the creation of a copy of working information in order to debug, improve or study its processing system. You can create a copy of your website or database using the backup instructions to make and debug any changes.\r\nThe need for backing up training and debugging versions of information is all the more high because the changes you make often lead to data loss.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Backup_Administration.png"},{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6759,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/1.png","logo":true,"scheme":false,"title":"Nutanix Enterprise Cloud","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nutanix-enterprise-cloud","companyTitle":"Nutanix","companyTypes":["supplier","vendor"],"companyId":3344,"companyAlias":"nutanix","description":"Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped.<br /><br />Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped. The solution innovative combines components that create a solution together, delivering new levels of flexibility, reliability and performance.<br /><br />The hardware platform is represented by unified x86 servers (nodes), the configuration of which is selected in such a way as to best suit a specific type of customer's tasks. The minimum configuration is three standard nodes, to which you can add any number of new nodes as needed. At the same time, thanks to the use of a proprietary software package, the integration of new servers, respectively, an increase in power, performance and capacity of the system occurs automatically, without interrupting work.<br /><br />Dedicated software enables deep virtualization of compute and storage resources, providing the highest degree of flexibility and manageability across the Nutanix platform.<br /><br /><span style=\"font-weight: bold;\">Simplification and unification of IT infrastructure</span><br />Nutanix Enterprise Cloud dramatically simplifies virtual machine deployments. Consolidation of computing power and storage devices on a single software platform allows IT professionals to quickly and easily deploy new VMs.<br /><br /><span style=\"font-weight: bold;\">Reduced IT costs</span><br />Eliminate costly and difficult-to-maintain networked storage systems to reduce capital and operating expenses. With its unprecedented post-deployment virtual machine capability, Nutanix provides a simple, modular approach to building a modern data center.<br /><br /><span style=\"font-weight: bold;\">Equipping the central office and remote branches</span><br />The platform is suitable for the implementation of almost any task at the level of not only the central data center, but also branches. Ideal for on-premises application deployment, VDI, file services, DHCP and DNS printing, WAN optimization, and security-focused virtual appliances.","shortDescription":"Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Nutanix Enterprise Cloud","keywords":"","description":"Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped.<br /><br />Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equip","og:title":"Nutanix Enterprise Cloud","og:description":"Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equipped.<br /><br />Nutanix Enterprise Cloud is a hyper-converged software-defined infrastructure that is changes the way data center is equip","og:image":"https://old.roi4cio.com/fileadmin/user_upload/1.png"},"eventUrl":"","translationId":6759,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":509,"title":"Converged and Hyper Converged System","alias":"converged-and-hyper-converged-system","description":" Converged and hyper convergent infrastructures simplify support for virtual desktop infrastructure and desktop virtualization, as they are designed to be easy to install and perform complex tasks.\r\nConvergent infrastructure combines the four main components of a data center in one package: computing devices, storage devices, network devices, and server virtualization tools. Hyper-converged infrastructure allows for tighter integration of a larger number of components using software tools.\r\nIn both convergent and hyper-convergent infrastructure, all elements are compatible with each other. Thanks to this, you will be able to purchase the necessary storage devices and network devices for your company at a time, and they, as you know, are of great importance in the virtual desktops infrastructure. This allows you to simplify the process of deploying such an infrastructure - something that has been waiting for and what will be rejoiced by many companies that need to virtualize their desktop systems.\r\nDespite its value and innovation, there are several questions to these technologies regarding their intended use and differences. Let's try to figure out what functionality offers converged and hyper-convergent infrastructures and how they differ.","materialsDescription":" <span style=\"font-weight: bold;\">What is converged infrastructure?</span>\r\nConvergent infrastructure combines computing devices, storage, network devices and server virtualization tools in one chassis so that they can be managed from one place. Management capabilities may include the management of virtual desktop infrastructure, depending on the selected configuration and manufacturer.\r\nThe hardware included in the bundled converged infrastructure is pre-configured to support any targets: virtual desktop infrastructures, databases, special applications, and so on. But in fact, you do not have enough freedom to change the selected configuration.\r\nRegardless of the method chosen for extending the virtual desktop infrastructure environment, you should understand that subsequent vertical scaling will be costly and time-consuming. Adding individual components is becoming complex and depriving you of the many benefits of a converged infrastructure. Adding workstations and expanding storage capacity in a corporate infrastructure can be just as expensive, which suggests the need for proper planning for any virtual desktop infrastructure deployment.\r\nOn the other hand, all components of a converged infrastructure can work for a long time. For example, a complete server of such infrastructure works well even without the rest of the infrastructure components.\r\n<span style=\"font-weight: bold;\">What is a hyper-convergent infrastructure?</span>\r\nThe hyper-converged infrastructure was built on the basis of converged infrastructure and the concept of a software-defined data center. It combines all the components of the usual data center in one system. All four key components of the converged infrastructure are in place, but sometimes it also includes additional components, such as backup software, snapshot capabilities, data deduplication functionality, intermediate compression, global network optimization (WAN), and much more. Convergent infrastructure relies primarily on hardware, and software-defined data center often adapts to any hardware. In the hyper-convergent infrastructure, these two possibilities are combined.\r\nHyper-converged infrastructure is supported by one supplier. It can be managed as a single system with a single set of tools. To expand the infrastructure, you just need to install blocks of necessary devices and resources (for example, storage) into the main system block. And this is done literally on the fly.\r\nSince the hyper-convergent infrastructure is software-defined (that is, the operation of the infrastructure is logically separated from the physical equipment), the mutual integration of components is denser than in a conventional converged infrastructure, and the components themselves must be nearby to work correctly. This makes it possible to use a hyper-convergent infrastructure to support even more workloads than in the case of conventional converged infrastructure. This is explained by the fact that it has the possibility of changing the principle of definition and adjustment at the program level. In addition, you can make it work with specialized applications and workloads, which pre-configured converged infrastructures do not allow.\r\nHyper-converged infrastructure is especially valuable for working with a virtual desktop infrastructure because it allows you to scale up quickly without additional costs. Often, in the case of the classic virtual desktops infrastructure, things are completely different - companies need to buy more resources before scaling or wait for virtual desktops to use the allocated space and network resources, and then, in fact, add new infrastructure.\r\nBoth scenarios require significant time and money. But, in the case of hyperconvergent infrastructure, if you need to expand the storage, you can simply install the required devices in the existing stack. Scaling can be done quickly — for the time required to deliver the equipment. In this case, you do not have to go through the full procedure of re-evaluation and reconfiguration of the corporate infrastructure.\r\nIn addition, when moving from physical PCs to virtual workstations, you will need devices to perform all the computational tasks that laptops and PCs typically perform. Hyper-converged infrastructure will greatly help with this, as it often comes bundled with a large amount of flash memory, which has a positive effect on the performance of virtual desktops. This increases the speed of I / O operations, smoothes work under high loads, and allows you to perform scanning for viruses and other types of monitoring in the background (without distracting users).\r\nThe flexibility of the hyper-converged infrastructure makes it more scalable and cost-effective compared to the convergent infrastructure since it has the ability to add computing and storage devices as needed. The cost of the initial investment for both infrastructures is high, but in the long term, the value of the investment should pay off.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Converged_and_Hyper_Converged_System.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":691,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Nutanix_Prism.jpg","logo":true,"scheme":false,"title":"Nutanix Prism","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nutanix-prism","companyTitle":"Nutanix","companyTypes":["supplier","vendor"],"companyId":3344,"companyAlias":"nutanix","description":"Nutanix Prism Benefits:\r\nSimplified workflows with rich built-in automation\r\nConsumer-grade experience with one-click simplicity\r\nCentralized solution for infrastructure management and everyday operations\r\n\r\nOne-click\r\nInfrastructure Management - Centralized infrastructure management all the way up to virtual machines.\r\nOperational Insights - Rich insights and proactive recommendations about day to day operations.\r\nPlanning - Intelligent insights into capacity usage with precise optimization recommendations.","shortDescription":"Nutanix Prism gives administrators a simple and elegant way to manage virtual environments. Powered by advanced data analytics and heuristics, Prism simplifies and streamlines common workflows within a datacenter eliminating the need to have disparate management solutions.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Nutanix Prism","keywords":"with, management, insights, infrastructure, operations, Nutanix, recommendations, Centralized","description":"Nutanix Prism Benefits:\r\nSimplified workflows with rich built-in automation\r\nConsumer-grade experience with one-click simplicity\r\nCentralized solution for infrastructure management and everyday operations\r\n\r\nOne-click\r\nInfrastructure Management - Centralized i","og:title":"Nutanix Prism","og:description":"Nutanix Prism Benefits:\r\nSimplified workflows with rich built-in automation\r\nConsumer-grade experience with one-click simplicity\r\nCentralized solution for infrastructure management and everyday operations\r\n\r\nOne-click\r\nInfrastructure Management - Centralized i","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Nutanix_Prism.jpg"},"eventUrl":"","translationId":692,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}