WD silently murders Arkeia backupware

Rumours of its continued existence have been exaggerated

WD has admitted it is killing off its Arkeia backup software product: it is no longer selling it to new customers and stopping development.

Privately-owned Arkeia was bought by Western Digital in January 2013, bringing WD its deduplicating Network Backup software product and technology. It was placed inside WD’s Branded Products SMB unit and its CEO, Bill Evans, became general manager of WD’s Business Storage Solutions Unit. His LinkedIn profile shows him leaving in April 2014.

The product is visible on WD's website:


If you click the Learn More button you're told "Customers under maintenance can access this upgrade through their support portal". There's no information about where new customers could get help.

In February "Kalthen", a WD Community contributor, asked a question about Arkeia activity stopping:


An answer came back from "Bill_S", a community manager, on May 28:


This prompted a clarifying question:

So are you saying that:

1. you are no longer selling to new customers,

2. all support for all Arkeia products will end in 2019 at the latest,

3. current products will not be developed any further?

To which the reply was indeed clarifying:


To sum up.

  • WD Arkeia is no longer being sold to new customers.
  • In the case where customers have purchased extended maintenance agreements, we will support those agreements through Dec 31, 2019.
  • Existing products are under "Sustaining Support" which means new product features and further development or enhancements are not available.

Conclusion: the Arkeia backup software product is dead.

We have asked WD to confirm that this is the case and will update you if and when we hear more. ®

Similar topics

Other stories you might like

  • Western Digital open to spinning out flash, hard disk businesses
    Messrs Elliott strike again

    Western Digital has confirmed the board is considering "strategic alternatives" for the storage supplier, including spinning out its flash and hard disk businesses.

    This follows calls last month by activist investor Elliott Management, which has amassed a $1 billion investment in WD equating to a six percent share stake, for a "full separation" based on those product lines.

    In a statement, CEO David Goeckeler said: "The board is aligned in the belief that maximizing value creation warrants a comprehensive assessment of strategic alternatives focused on structural options for the company's Flash and HDD businesses.

    Continue reading
  • Elliott Management to WDC board: Spin out or sell flash biz
    HDD and NAND memory maker has 'underperformed by any objective measure'

    Updated Activist investor Elliott Management is pushing for Western Digital Corporation's board to break the business in two by splitting the hard disk drive and NAND flash divisions into separately traded entities.

    In an open letter to the board [PDF], Elliott – which has over time invested roughly $1 billion in WDC, representing about a 6 percent stake – says it is almost six years since WD bought SanDisk for $19 billion, scooping up its NAND memory biz.

    At the time, this purchase was "nothing less than transformative", the letter adds, propelling five-decade-old WDC beyond HDDs into one of the biggest players in flash. Synergies, a better strategic position, and enhanced financial profile were among the rationale for the deal, says Elliott.

    Continue reading
  • Western Digital tells EdgeRover users to patch app again
    Critical vulnerability may have allowed an attacker to escalate local privileges

    Users of Western Digital's EdgeRover app for Windows and Mac are advised to download an updated version to avoid a security flaw that might allow an attacker unauthorized access to directories and files.

    The flaw, which was given the CVE identification number CVE-2022-22988, carries a Common Vulnerability Scoring System (CVSS) severity rating of 9.1, making it a critical weakness. It has now been addressed, however, with a modification to the way EdgeRover handles file and directory permissions.

    According to Western Digital, the flaw meant that EdgeRover was subject to a directory traversal vulnerability, which may have allowed an attacker to carry out a local privilege escalation and bypass file system sandboxing. If successfully exploited, this could lead to the disclosure of sensitive information or even a potential denial-of-service attack, the firm said.

    Continue reading

Biting the hand that feeds IT © 1998–2022