Close this search box.

2024-25 DCIG TOP 5 Cyber Secure High-End All Flash Arrays Report Now Available

GET THE FREE REPORT ON THE DCIG TOP 5 Cyber Secure High-End All Flash Arrays.


DCIG is pleased to announce the immediate availability of the 2024-25 DCIG TOP 5 Cyber Secure High-End All Flash Arrays – Global Edition report. This report provides guidance on the TOP 5 cyber secure high-end all flash arrays that organizations should consider in their fight against ransomware. These TOP 5 high-performance primary storage arrays afford organizations the best options for serving and protecting the data associated with their most critical workloads.

Critical Need for Cyber Secure High-End Arrays

Cyber crimes and data breaches have become an everyday threat for IT professionals. More than 330 publicly disclosed data breaches and cyber attacks occurred in just the first two months of 2024. These developments highlight the need for organizations, especially those that provide criti­cal infrastructure services, to detect and thwart cyber attacks and ensure cyber resiliency— the ability to continue operations after falling victim to an attack. Many companies with crucial business and customer data depend on high-end storage arrays to provide uninter­rupted access to their data. These high-end storage arrays require built-in cyber resilience to keep that data safe and enable quick recovery if data is compromised.

Recent Advances in Cyber Secure Storage

The cyber threat landscape calls for a multi-layered approach to securing data infrastruc­ture. The National Institute of Standards and Technology, an agency of the U.S. Govern­ment, promulgated a cybersecurity framework that provides actionable guidance to help organizations manage, reduce, and communicate cybersecurity risks for systems, networks, and other assets that process data.

NIST Cybersecurity Framework 2.0
Source: The National Institute of Standards and Technology Cybersecurity Framework 2.0 document

This report looks at how various features and capabilities of high-end all flash arrays help customers address the six functions of the NIST Cybersecurity Framework 2.0. Those functions are:

  • Govern – how an organization establishes its cybersecurity strategy and cybersecurity supply chain risk management, along with its policies and oversight of that strategy.
  • Identify – how an organization understands assets related to its data, hardware, software, and systems so it can identify, prioritize, and improve risk management strategies and practices.
  • Protect – the ability to secure assets through identity management, authentication, access control, awareness and training, data and platform security, and resilient technology infrastructure.
  • Detect – an organization’s ability to make timely discovery and analysis of anomalies, indicators of compromise, and other potentially adverse events that may indicate a cybersecurity attack is underway.
  • Respond – the ability to contain the impact of a cybersecurity event through incident management, analysis, mitigation, reporting, and communication.
  • Recover – the ability to restore assets and operations affected by a cybersecurity attack, return to normal operations, and enable effective communication during a recovery.

Critical Features of the Cyber Secure High-End All Flash Arrays

DCIG believes it is only a matter of time before a cyberattack successfully breaches any organization’s security defenses. Storage arrays and their providers have a role to play in preventing, mitigating, and recovering from cybersecurity incidents.

Every enterprise storage vendor is addressing customer concerns around data security and cyber resilience, especially the threat of ransomware. Most high-end storage arrays have improved their security posture by implementing multiple technologies, including FIPS 140, T10 PI, and multi-factor authentication.

Common Features Across High-End All Flash Arrays

Immutable snapshots. All the DCIG TOP 5 Cyber Secure High-end All Flash Arrays support immutable snapshots, which are read-only copies of data that cannot be changed or altered. Because snapshots are a fundamental part of the backup and recov­ery process, they have become a prime target of cybercriminals. Immutable snapshots have become common in storage systems, as 13 of the 14 arrays DCIG looked at support them. Immutable snapshots address the Protect and Recover functions of the NIST Cybersecurity Framework.

Encryption. All 14 arrays DCIG looked at support encryption, either array-based or through self-encrypted drives. Encryption addresses the Protect function of the NIST Cybersecurity Framework.

Non-disruptive upgrade features. The DCIG TOP 5 Cyber Secure High-end All Flash Arrays all support non-disruptive upgrades for adding and replacing controllers, upgrad­ing controller code, migrating data, adding storage nodes or shelves, and upgrading firmware for storage media and network ports. Non-disruptive upgrade features address the Protect function of the NIST Cybersecurity Framework, by enabling organizations to keep array software and firmware up-to-date without having to schedule a downtime maintenance window.

DCIG TOP 5 Cyber Secure High-End All Flash Arrays

In preparing this report, DCIG formally evaluated over 50 different storage systems based on multiple different features and capabilities. Fourteen of these solutions met DCIG’s criteria for a cyber secure high-end all flash array.

For this report, DCIG examined 14 high-end storage arrays. The primary cyber security features DCIG looked at included:

TABLE DCIG TOP 5 Cyber Secure High End All Flash Arrays Global Edition
  • Data immutability
  • Encryption
  • Replication/snapshots
  • Security technologies (FIPS 140, hardware root of trust, multi-factor authentication, multiple roles, multiple approvals)
  • Security information and event management (SIEM) Integration
  • Storage analytics and proactive support
  • Vendor management of arrays (STaaS)

Based on these criteria, DCIG awarded the following products a DCIG TOP 5 award for Cyber Secure High-End All Flash Arrays (in alphabetical order):

  • Dell PowerMax 8500
  • Hitachi Vantara Virtual Storage Platform 5600
  • Huawei OceanStor Dorado 18000
  • Infinidat InfiniBox SSA II
  • NetApp AFF/ASA A900


 Get the full 2024-25 DCIG TOP 5 Cyber Secure High-End All Flash Arrays – Global Edition report at no charge with registration by following this link. The full report contains additional details such as:

  • The critical need for cyber secure high-end storage arrays
  • How storage array features map to the NIST Cybersecurity Framework
  • Similarities and differences between the DCIG TOP 5 arrays.
  • A profile of each array that lists some of the outstanding capabilities that helped it earn a spot in the 2024-25 DCIG TOP 5 Cyber Secure High-End All Flash Arrays – Global Edition report.


Other than excerpts from this report published in this announcement, the contents of the 2024-25 DCIG TOP 5 Cyber Secure High-End All Flash Arrays – Global Edition report are copyrighted and may not be republished without the express written permission of DCIG.


DCIG will release more DCIG TOP 5 reports in the weeks and months to come. Please sign up for the weekly DCIG Newsletter to receive notice of their availability.

To learn about DCIG’s forthcoming research and publications, see the DCIG Research and Publication  Calendar.

Technology providers interested in licensing DCIG TOP 5 reports or having DCIG produce custom reports, please contact DCIG for more information.


Click Here to Signup for the DCIG Newsletter!


DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.