Search
Close this search box.

Why Capacity-Based Licensing Is Gone

Share This Post

StrongLink is the ultimate heterogeneous storage management software solution with advanced technologies for intelligent data management in local, network and cloud storage.
Large IT organizations hate licensing software because of its capacity for one simple reason: data grows exponentially – a fact over which they often have little or no control. And they have even less control over the license price, which rises steadily as the amount of data stored increases.
What is affected is the range of products for storage, backup, archiving, replication, data management, data monitoring and data movement.
Software vendors love software licenses that can be billed by capacity. The procedure is the same for most providers: a cheap entry-level system and expensive extensions once the company has decided on a manufacturer. With each extension, the term is extended. The classic vendor lockin.
In the cloud age, another component determines the price: performance. Network bandwidth licensing adds further complexity to the license jungle. Not only the bandwidth is licensed based on the cumulative amount of data that is transmitted over the network. It also licenses the maximum amount of data that can be transmitted through the network at any given time. Such licensing is typically based on bits per second. If more data needs to be transported within the same period, the license must be extended. Sounds reasonable and fair for most IT departments.
As always, the trick is in the complexity.
Software license tied to the hardware
Own software license for each switch
Software license for monitoring
Software license for backup according to data volume or optionally services to be backed up (!= clients)
Central Management Licenses Transmission Path Licenses
Licenses for cloud storage and additional licenses for movements (uploads, moves, downloads, etc.)
Licenses for processor cores (which can get expensive with an Oracle database on an AMD server with 64 cores – per CPU!)
Licenses for virtual instances, which can quickly become unpredictable with containers
etc. etc.
In general, these licenses are also asynchronous. For example, it is much cheaper to load data into the cloud than to get it out again. We’re talking about data lock-in here.
StrongBox Data Solutions has set out to make the management of capacity-based licensing transparent and automated with StrongLink. For the development of the StrongLink Autonomous Data Management solution, therefore, all forms of capacity-based metering licenses were eliminated as the central design principle of a scale-out architecture. There is no capacity licensing at StrongLink and never will be. With StongLink, only the performance that a company needs to manage its workflows is licensed.
Prices do not change over time. This simplifies budgeting.
The license is calculated using four simple variables:
What is the power of a node?
How many nodes are there per site?
How many locations are there?
Is tape storage involved?
For example, we refer to an instance of StrongLink that becomes a client on a server or VM as a Star or StrongLink node. The license amount of such a Star Node (Star License) is based on the number of CPU cores in this node allocated to the system. For lighter workflows and simpler use cases, a smaller number of CPU cores would also be used and licensed. Heavier or more complex workflows with higher system requirements can be allocated a larger number of CPU cores to increase the node’s performance. Here the license costs are also higher.
The second component of the StrongLink licensing model is figuring out if more than one star node, e.g. B. for HA or additional performance requirements are combined in one configuration. We then speak of a constellation. With its scale-out architecture, StrongLink can be deployed with three or more nodes. StrongLink can be expanded to as many nodes as needed to meet performance requirements.
The question of the number of geographic locations that e.g. B. connected remotely for DR or other replication use cases is easy to answer. From two locations or StrongLink constellations we speak of a galaxy.
The final variable is tape library support. This is an optional add-on as not everyone requires tape storage. For those who do, the ability to seamlessly expand their flash and disk-based storage with on-prem tape libraries without capacity limitations offers a tremendous benefit.
“Predictable, consistent pricing makes it easy to plan for the future with no surprises. This works even when it’s difficult to predict how fast the data will grow over time. Just like a network switch vendor doesn’t charge you a variable rate based on the amount of data going through your pipes, StrongLink licensing lets you control your storage costs without adding another capacity tax to your environment,” says Floyd Christofferson , CEO of StrongBox Data Solutions.
The ability to automate policy-based data placement across different storage types, including tape and cloud, doesn’t help organizations completely break away from closed vendor or data ecosystems. However, it helps them not to be further penalized for the growth of their data.
Do you want to see for yourself how you can manage your data and storage resources more efficiently and effectively? Arrange a PoC with us.

Cohesity Gaia: Revolutionizing Data Management with AI-Powered Conversational Search

Cohesity Gaia: Revolutionizing Data Management with AI-Powered Conversational Search In today’s fast-paced digital world, organizations face the challenge of managing massive volumes of data while ensuring quick, accurate access to information. Cohesity Gaia, an AI-powered conversational search tool, is designed to address this challenge, transforming the way businesses interact with

How Cohesity’s Integrated Approach to Data Security and Management Works

How Cohesity’s Integrated Approach to Data Security and Management Works As organizations manage increasing volumes of data across distributed environments, the need for a unified approach to data security and management becomes essential. Cohesity’s leading data management platform, addresses these challenges with an integrated approach that combines data protection, security,

NIS 2 vs. ISO 27001: A Comparison of Requirements

NIS 2 vs. ISO 27001: A Comparison of Requirements As organizations face an increasing number of cybersecurity threats, compliance with security standards and regulations becomes essential. Two prominent frameworks are the NIS 2 Directive (Network and Information Security Directive 2) and ISO 27001. While both aim to enhance cybersecurity resilience,

Protect Your Organization with Arctic Wolf

Protect Your Organization with Arctic Wolf’s IR JumpStart Retainer Program: A Proactive Approach to Cybersecurity In today’s evolving threat landscape, organizations are more vulnerable than ever to cyberattacks. The need for a swift, expert-led response to cyber incidents is crucial to limiting damage and ensuring recovery. Arctic Wolf’s Incident Response

Recent Cyber Attacks on Healthcare Organizations in Germany: A Growing Threat

Recent Cyber Attacks on Healthcare Organizations in Germany: A Growing Threat In our recent article we highlighted the top 5 industries targeted by cybercrime with the healthcare sector being number one. Germany’s healthcare sector has become a prime target for cybercriminals, with several significant cyberattacks in recent years causing widespread

The 5 Industries Most Targeted by Cybercrime

The 5 Industries Most Targeted by Cybercrime Cybercrime has become one of the most significant threats to global businesses, with hackers and cybercriminals increasingly targeting industries where sensitive data, critical infrastructure, and valuable financial information are stored. As the world becomes more digitally interconnected, cybercriminals are becoming more sophisticated, exploiting

it-sa 2024
Request your FREE admission voucher code.

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

CMT24 - Registrierung
Cristie Mopped Tour 2024

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Schauen Sie sich das DORA Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Watch the Spectra Tape Video

Thank you for submiting your email address. Press the button below to download the pdf.

Schauen Sie sich das NIS2 Directive Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Save the Data - Event Registrierung

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast

Thank you for your registration!





Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast Event

Thank you for your registration!





Participation subject to availability.

eBook: Transform Your Business with Mature Data Management

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Contact Info

Nordring 53-55, 63843 Niedernberg,
An der Burg 6, 33154 Salzkotten,
Germany

Monatliches Angebot für Cloud-Schutz anfordern

Thank you for your registration!

Wählen Sie mehrere aus, indem Sie beim Auswählen die Taste strg oder cmd drücken.

*Sie können die Anzahl der zugewiesenen Lizenzen in Microsoft 365 ermitteln, indem Sie zur Seite Microsoft 365 Admin center > Billing > Licenses navigieren.

** Die folgenden Abonnements werden von Cristie Cloud Backup für Google Workspace nicht berechnet:
Google Voice Starter (SKU ID: 1010330003)
Google Voice Standard (SKU ID: 1010330004)
Google Voice Premier (SKU ID: 1010330002)

Auf dem Weg zur intelligenten Welt – Whitepaper

Da neue Technologien wie 5G, IoT, Cloud Computing und Big Data in der digitalen Transformation eingesetzt werden, bewegt sich die IT-Architektur von Unternehmen in Richtung eines hybriden Frameworks aus „traditioneller IT + privater Cloud + öffentlicher Cloud + Edge“.

Thank you for submiting your email address. Press the button below to download the pdf.

Striding Towards the Intelligent World – White Paper

As new technologies, such as 5G, IoT, cloud computing, and big data, are being applied in digital transformation, enterprise IT architecture is moving towards a hybrid framework of “traditional IT + private cloud + public cloud + edge”. This report provides an in-depth outlook on the development of the data storage industry.

Thank you for submiting your email address. Press the button below to download the pdf.

Zero Trust Data Security for Dummies

Thank you for submiting your email address. Press the button below to download the pdf.