Deduplication and Beyond: Optimizing Performance for Backup and Recovery

Size: px
Start display at page:

Download "Deduplication and Beyond: Optimizing Performance for Backup and Recovery"

Transcription

1 Beyond: Optimizing Gartner clients using deduplication for backups typically report seven times to 25 times the reductions (7:1 to 25:1) in the size of their data, and sometimes higher than 100:1 for file system data or server virtualized images when data deduplication is used. Hype Cycle for Storage Technologies Gartner Research Report (2010) The real point: gain optimized performance with minimal sacrifice. With cost cutting so important for most organizations, data deduplication and the allure of significantly reduced storage and bandwidth usage has become the hot topic in data protection circles. But deduplication is just one component of performance optimization for data protection systems. This paper describes the benefits and potential risks of three optimization technologies commonly used for disk-based backup and recovery, enabling you to more confidently optimize your own data protection environment in the following ways: Reducing costs through optimized use of your backup storage Minimizing backup data transmitted and the amount of network bandwidth consumed Backing up and recovering data quickly and reliably Using encryption with less impact on performance Key Optimization Technologies: Deduplication, Compression, Encryption Data deduplication, compression, and encryption are three key interrelated technologies used for efficiently and securely transferring and storing data. Each vendor s approach has implications for an organization s environment. Some vendors focus heavily on only one method or technology, which creates additional risks. Understanding each of these technologies will help you ask the right questions as you evaluate specific solutions. Evaluating Deduplication Data deduplication is one of the primary optimization technologies used by today s disk-based data protection vendors. Deduplication reduces the overall size of backup data (or backup data footprints ) to be transmitted or stored to a secondary disk target by identifying and then removing or omitting any duplicate data in an organization s backup data sets. Duplicate data removed or omitted is often replaced by some type of pointer to the original file or data block. The following questions highlight areas to be aware of when exploring different deduplication implementations i365, Inc. All Righs Reserved.

2 Six Key Questions to Ask About Deduplication 1) What type of data deduplication is used in the backup process? There are two main types of deduplication used in disk-based backup and recovery. Time-based deduplication This method compares today s planned backup data against the last backup job s data. Because most data remains unchanged from backup to backup, time-based deduplication finds, transmits, and stores only the new blocks or differences (deltas) found since the last backup. Horizontal deduplication This type of deduplication compares differences and similarities across data targeted for backup, either within a single data set or across a set of volumes containing backup data. The comparison can happen between two or more files or two or more data blocks. If two or more duplicate files or blocks are found, the solution will retain one copy of the file/block and replace the other file/block with pointers to the retained copy. 2) At what point in the backup process does deduplication occur? Deduplication typically occurs at the following junctures of a backup process. Source-side deduplication (via server-side software or an inline appliance) This process typically occurs prior to the backup data being compressed and transmitted to its ultimate target. Watch for impact on CPU and network resources, nightly backup or hot backup windows, and recovery time objectives. Also inquire about the relative ease of restoring data, and the need for specialized hardware to sustain performance. Back-end deduplication Often referred to as post-process deduplication, this usually occurs on the backup disk target after a backup process has already been completed. Watch for negative impact on LAN/WAN resources when sending larger backup data sets over the wire, and the ease of restoring individual files or full data sets. Mixed source-side and back-end deduplication Some solutions blend sourceside and back-end deduplication, which can result in additional footprint savings. 3) What is the size of data processed for deduplication? Backup solutions can deduplicate different data sizes, which can impact the optimization and efficiency of the solution. File-level deduplication This method finds duplicate files only, which can be simpler and less resource-intensive than other methods. But it can require significantly more storage space than more granular methods; small changes to one file require backing up the entire changed file, instead of just backing up the changed portion of the file. Block-level deduplication Blocks are chunks of data that are smaller than a file, but there is wide variation in the block sizes different vendors deploy with deduplication. Overall, block-level deduplication will save more storage space for backup than file-level deduplication. Watch for performance impact based on smaller, more granular block sizes in use; the smaller the size, the greater the performance impact on production systems. Check for overhead and extra CPU resources needed to process and manage data blocks. Additionally, oversized blocks may adversely affect database backups. Some database page or chunk sizes may perform better when the deduplication process uses 32K or 64K data blocks (which can be more readily compressed), although deduplication savings may be reduced.

3 Byte-level deduplication The most granular data size and potentially the largest storage savings. Watch for a large performance hit and data fragmentation of large, growing files that now may be dispersed across multiple disk targets or backup tapes. Also watch for any validation and recovery checks needed, and more time needed to rebuild or restore when something goes wrong. 4) Where is the deduplicated data stored? Deduplicated data can be stored on a local disk target (located on premise), transmitted to a remote disk target (either at a physical site or a third-party cloud or data center), or sent to a disk-based virtual tape library before being offloaded to tape. Watch for ease of restoring data, especially in tape environments where data may be fragmented, offsite, dispersed, and subject to loss. 5) How will deduplication impact performance? In some cases, the deduplication process may reduce performance and extend your backup window. Watch for performance bottlenecks and lack of optimization for LAN or WAN implementations, especially for solutions that must first transmit full backup data sets prior to deduplication. Also watch for over-dependence on local deduplication hardware, such as the need to transmit deduplicated data to a local appliance prior to replicating it over the WAN. Repeated checks and verifications of local nodes to ensure existence of deduplicated blocks as part of each backup process may also slow performance. 6) What are the costs to deploy or grow the deduplication environment? Some solutions require licensed hardware nodes or controllers; keep in mind that as the data environment grows, the need for extra nodes may grow as well. Watch for excessive investment in underlying hardware to support deduplication. With disk prices continuing to drop, you may want to contrast regaining the most storage space against the ROI you ll gain from any one solution over another. Evaluating Compression Data compression is often performed as part of deduplication, or somewhere else on the front end. Its purpose is to compress backup data before the data is transmitted across a LAN or WAN connection, thereby reducing impact on your network traffic and storage requirements. Three Key Questions to Ask About Compression 1) How will compression impact the rest of the production environment? Compression reduces the amount of backup data being pushed across your network, so it can reduce the amount of network bandwidth needed, which may allow room for other common network activities. However, data compression may soak up other computational resources to compress and uncompress the data. 2) How much can you control the bandwidth used for backup? Compression doesn t operate in isolation from the rest of your environment. Watch for how well it allows you to adjust the amount of bandwidth used for backup. Some solutions may be set a certain way for maintaining backup speed with less customer control.

4 3) How well does compression technology adapt to the amount of available bandwidth in your environment? Some networks have large amounts of bandwidth available for backup, while others are seriously bandwidth-constrained, and bandwidth may vary during off-hours and peak production times. Explore whether transmission processes can adapt to different bandwidths or spikes in usage, or let you define how much bandwidth may be used for backup during various times. Evaluating Encryption Encryption is key to any data protection solution. Many data breaches occur when unencrypted backup data ends up in the wrong hands, either accidentally or intentionally. In addition, regulatory obligations require organizations to use encryption. Ask the right questions to optimize its use and ensure the process meets all your security goals. Two Key Questions to Ask About Encryption 1) Where in the backup process can encryption be applied? Determine where you are most likely to need your backup data encrypted and how well the vendor solution meets that need. Is backup data encrypted at the start of a backup job? As it is transmitted over the wire (in flight)? While the data resides at rest on the target disk device? Some vendors offer only one or two encryption options. Some offer all three. 2) Who holds the keys? In information security circles, a Trust No One security paradigm means that only the customer holds and manages the encryption key and is capable of decrypting backup data. Your data will be more secure if your vendor follows this paradigm even when the data has been replicated or transmitted to a data center for added retention and off-site disaster recovery. Learn how security roles and encryption key safeguards are applied. EVault: Meeting Customer Needs for End-to-End Optimization EVault is a highly efficient, adaptable backup and recovery solution that is fast and easy to use, affordable to implement and grow, with a simple architecture for lowkey maintenance. EVault offers a number of technologies and strategies to optimize the backup process at the source, in transit, and at rest. The result is end-to-end efficiencies that minimize traffic and reduce data footprints, striking the right balance between security, efficiency, affordability and adaptability. The EVault Approach to Deduplication, Compression, Encryption EVault s WAN-optimized data transfer method uses minimal bandwidth and produces the smallest possible local footprint. Its simplified, single recovery path avoids use of differentials and incrementals as part of the recovery process. Building synthetic full backups dynamically each time a backup job arrives at the vault, EVault restores even deduplicated data from its disk-based storage pools in a straightforward way. EVault s time-based deduplication technology has been actively developed and refined for efficiency gains, both over the wire and at rest, since 1997 long before deduplication took center stage. EVault ensures the best use of network resources, while its encryption approach has also proven effective and secure for a wide range of customers. The result is a balanced, affordable solution that readily adapts to an organization s needs no overhauls, costly upgrades, or re-architecting required.

5 EVault Backup and Recovery Highlights Time-based deduplication with extremely low up-front processing time to reduce backup windows Source-side and back-end, blocklevel deduplication to minimize backup footprints Adaptive compression and dynamic bandwidth throttling to optimize LAN/ WAN network performance End-to-end data encryption with a strict Trust No One security approach and choice of 128- or 256-bit AES encryption to provide the highest level of security Balanced approach to data protection offering speed, efficiency, affordability and adaptability Figure 1. EVault data transfer process, including two-part deduplication, compression and encryption for optimized backup, transmission and data storage. EVault Optimized at the Source and In Transit: Time-based Deduplication with Adaptive Compression EVault can dramatically reduce the amount of backup data transmitted to the disk target, or vault. EVault technology has been continually enhanced and field-proven to provide the best balance between storage optimization and backup performance. EVault uses a source-side, time-based deduplication technology that searches, finds, and transmits only those new or changed data blocks since the last backup job. This up-front functionality offers storage capacity savings of upwards of 50:1 over traditional file-based backup methods. Some solutions that claim to process block-level changes are working with blocks closer in the size to traditional files. In contrast, EVault works with 32KB data blocks, the most efficient block size for reducing the amount of data to be transferred while speeding block-level processing. Day 1 Initial Seed Backup A C B D System with EVault Agent Day 2 Backup A C E B D System with EVault Agent A B C D E All New Data Blocks Sent to the EVault Director Vault Adaptive Compression Reduces Size of Blocks Transmitted by an Average of 50% A B C EVault Director D QFS Process Identifies/Sends New Data Block E to the EVault Director Adaptive Compression Reduces Size of Block Transmitted by an Average of 50% A B C D E EVault Director Figure 2. Example of EVault deduplication techniques and Adaptive Compression.

6 EVault incorporates a number of optimized processes to ensure rapid, front-end processing and reductions in data footprints. Quick File Scan (QFS) Patented process rapidly scans files on every system or server containing an EVault agent to identify any data blocks added or changed since the prior backup. Up-front processing time is low, ensuring optimal backup windows. Adaptive Compression Reduces data blocks transmitted by an average of percent. EVault selects the best compression algorithm based on available CPU and network bandwidth. Enhanced CPU Utilization Automatically splits backup jobs across multiple CPUs. Self-Healing Functionality Automatically recreates the delta index file if it is corrupted or missing. This way, EVault continues to function and identify only new or changed blocks. Additional EVault optimizations include the following. Dynamic Bandwidth Throttling Enables customers to control the amount of network bandwidth used for backup jobs. Especially useful for more frequent backups of more critical data, or for environments with limited bandwidth available. Backup/Restore Transfer Protocol (BRTP) This custom-developed, secure protocol runs transparently on top of TCP/IP. BRTP offers many levels of error checking, error recovery, and connection recovery for ensured data integrity and continuation, or resumption, of backup sessions after a network outage. If a backup can t be completed, data backed up that far is valid. BRTP also ensures data encryption in transit. EVault Post-Process Deduplication Technology for Additional Optimization Beyond its front-end capabilities to reduce backup data footprints, EVault goes one step further by also performing deduplication at the target. This ensures backup jobs run optimally while looking for duplicate data within each backup job pool that may have been renamed, but was not subsequently identified as a duplicate during the source-side deduplication process. This back-end deduplication can help reclaim an additional 20 percent of storage space on the vault. Data deduplication at the target uniquely identifies matching blocks across all files in a backup job and eliminates duplicates. This back-end process does not adversely impact the backup window or slow performance of backup jobs. Other target-level EVault optimization technologies include the following: Storage Pool Optimization Enables longer data retention in smaller footprints. Storage pool management includes: Automatic removal/reclamation of expired blocks Per the customer s retention policy, the oldest backup blocks no longer required are deleted or moved to a different storage tier, with related storage space reclaimed. Defragmentation of the vault data This further tunes the storage pool. Verification of backup data integrity Migration to Secondary Storage Pools EVault can automatically migrate or copy data to less expensive, secondary storage pools. This functionality also enables agents to recover data directly from a secondary pool. Some organizations may choose to store long-term archival backups on a less-costly system that can be detached and turned off when not in use to cut utility expenses.

7 EVault End-to-End Encryption Technology EVault customers enjoy the ability to easily encrypt all aspects of their backup data transactions, end to end from the point of backup job creation through data transmission to data at-rest on the vault. Role-based security options enable EVault customers to assign the ultimate authority to restore, encrypt, and decrypt data, or perform other backup and restore functions. Only the EVault customer holds the encryption key. Once the customer sets the encryption password and settings during a backup job, backup data cannot be decrypted without the same encryption password. No i365 personnel ever have access to a customer s encryption key. Maintaining a strict Trust No One approach to encryption ensures that, even as i365 manages data in the EVault cloud or at the customer s offsite location, no i365 personnel can ever view the encrypted data. With EVault, customers can choose to encrypt their backup data at different phases of the backup process: at creation, in transit, and at rest. When configuring backup jobs, customers can choose from either 128-bit or 256-bit AES encryption. Encrypted data also remains encrypted while in the vault. Most data is transmitted as block-level changes, offering further security during transmission. Customers transmitting data across external WAN connections can choose 128-bit AES encryption. Conclusion A vendor s approach to data deduplication, compression and encryption has implications for an organization s data protection environment. EVault has been carefully designed and improved throughout the years to offer the best mix of optimization technologies resulting in a balanced, highly efficient, adaptable solution that is fast and easy to use, affordable to implement and grow, with a simple architecture that doesn t require significant extra investments. EVault data protection technology helps over 30,000 customers protect over 35 petabytes of data and has become a successful, fieldproven example of what works when it comes to affordable, efficient disk-based data protection and recovery. For More Information To learn more about i365 and EVault storage solutions, please: Visit us at us at In North America, call us at DATA (3282) In France, call us at +33 (0) In Germany, call us at +49 (0) In the Netherlands, call us at +31 (0) In the United Kingdom, and elsewhere in Europe, call us at +44 (0) i365 marks are either trademarks or registered trademarks of i365 Inc. or one of its affiliated companies in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners.

8

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker Recovery: A Guide for the Businesses today face unrelenting data growth. IT staffs struggle to ensure data availability under tight fiscal constraints. The unreliability and intensive management of traditional

More information

The EVault Portfolio

The EVault Portfolio The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise

More information

Evaluating EVault Software Backup and Recovery Technology

Evaluating EVault Software Backup and Recovery Technology Software Backup and Recovery Technology Since 1997, EVault Data Protection Solutions have served the disk-based backup and recovery needs of hundreds of credit unions. Today, its 35,000 customer roster

More information

FUJITSU Backup as a Service Rapid Recovery Appliance

FUJITSU Backup as a Service Rapid Recovery Appliance FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organization is rapidly increasing in importance. It guides and supports

More information

cloud-con nect ed stor age so lu tion (compound noun)

cloud-con nect ed stor age so lu tion (compound noun) Pixius Advantage Outsourcing Managed Services cloud-con nect ed stor age so lu tion (compound noun) Next-generation data protection that backs up your data onsite for fast, local backups and restores,

More information

Demystifying Deduplication for Backup with the Dell DR4000

Demystifying Deduplication for Backup with the Dell DR4000 Demystifying Deduplication for Backup with the Dell DR4000 This Dell Technical White Paper explains how deduplication with the DR4000 can help your organization save time, space, and money. John Bassett

More information

Reducing Backups with Data Deduplication

Reducing Backups with Data Deduplication The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...

More information

Always On: Unitrends Disaster Recovery Services (DRaaS)

Always On: Unitrends Disaster Recovery Services (DRaaS) Solution Brief Always On: Unitrends Disaster Recovery Services (DRaaS) What keeps you up at night? Are you thinking about about what would happen to your business in the event of a disaster? Are you worrying

More information

Presents. Attix5 Technology. An Introduction

Presents. Attix5 Technology. An Introduction Presents Attix5 Technology An Introduction January 2013 1. Global Block Level Deduplication. Attix5 Feature Top 10 Things That Matter When Attix5 is first installed on a target server a full backup is

More information

Secure Your Business with EVault Cloud-Connected Solutions

Secure Your Business with EVault Cloud-Connected Solutions Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault

More information

Data Deduplication: An Essential Component of your Data Protection Strategy

Data Deduplication: An Essential Component of your Data Protection Strategy WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING

More information

WHITE PAPER. How Deduplication Benefits Companies of All Sizes An Acronis White Paper

WHITE PAPER. How Deduplication Benefits Companies of All Sizes An Acronis White Paper How Deduplication Benefits Companies of All Sizes An Acronis White Paper Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 What is deduplication?... 4 File-level deduplication

More information

Barracuda Backup for Managed Services Providers Barracuda makes it easy and profitable. White Paper

Barracuda Backup for Managed Services Providers Barracuda makes it easy and profitable. White Paper Barracuda Backup for Managed Services Providers Barracuda makes it easy and profitable White Paper Barracuda Backup for Managed Service Providers Managed service providers (MSPs) need to ensure that they

More information

Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication

Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Table of Contents Introduction... 3 Shortest Possible Backup Window... 3 Instant

More information

Protect Data... in the Cloud

Protect Data... in the Cloud QUASICOM Private Cloud Backups with ExaGrid Deduplication Disk Arrays Martin Lui Senior Solution Consultant Quasicom Systems Limited Protect Data...... in the Cloud 1 Mobile Computing Users work with their

More information

Backup Over 2TB: Best Practices for Cloud Backup and DR with Large Data Sets

Backup Over 2TB: Best Practices for Cloud Backup and DR with Large Data Sets TECH BRIEF Backup Over 2TB: Best Practices for Cloud Backup and DR with Large Data Sets EXECUTIVE SUMMARY Most cloud backup doesn t work for data sets above 2TB. A widely held perception is that slow data

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information

EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY USING NDMP

EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY USING NDMP White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business

More information

TABLE OF CONTENTS. pg. 02 pg. 02 pg. 02 pg. 03 pg. 03 pg. 04 pg. 04 pg. 05 pg. 06-09 pg. 10. Feature-Benefit Summary How It Works. 1 www.keepitsafe.

TABLE OF CONTENTS. pg. 02 pg. 02 pg. 02 pg. 03 pg. 03 pg. 04 pg. 04 pg. 05 pg. 06-09 pg. 10. Feature-Benefit Summary How It Works. 1 www.keepitsafe. TABLE OF CONTENTS Secure Cloud Backup and Recovery Key Features Fast Backup & Restore 24/7 Corruption Detection Data Security Bandwidth Optimization Exchange Backups Long Term Archiving Feature-Benefit

More information

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief Uni Vault An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service White Paper Solution Brief Contents The Challenges of Traditional Backup... 3 The Uni Systems Data Protection as a Service

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

More information

DXi Accent Technical Background

DXi Accent Technical Background TECHNOLOGY BRIEF NOTICE This Technology Brief contains information protected by copyright. Information in this Technology Brief is subject to change without notice and does not represent a commitment on

More information

Turnkey Deduplication Solution for the Enterprise

Turnkey Deduplication Solution for the Enterprise Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for

More information

Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment

Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment A WHITE PAPER Abstract: Since VTL uses disk to back up data, it eliminates the media and mechanical errors

More information

Don t be duped by dedupe - Modern Data Deduplication with Arcserve UDP

Don t be duped by dedupe - Modern Data Deduplication with Arcserve UDP Don t be duped by dedupe - Modern Data Deduplication with Arcserve UDP by Christophe Bertrand, VP of Product Marketing Too much data, not enough time, not enough storage space, and not enough budget, sound

More information

LDA, the new family of Lortu Data Appliances

LDA, the new family of Lortu Data Appliances LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology

More information

Solving Data Growth Issues using Deduplication

Solving Data Growth Issues using Deduplication Solving Data Growth Issues using Deduplication Reducing Storage Costs and Speeding Backups with Dell Deduplication Solutions Abstract Data growth is increasing at record rates, and ensuring the integrity

More information

DATA BACKUP & RESTORE

DATA BACKUP & RESTORE DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is

More information

Long term retention and archiving the challenges and the solution

Long term retention and archiving the challenges and the solution Long term retention and archiving the challenges and the solution NAME: Yoel Ben-Ari TITLE: VP Business Development, GH Israel 1 Archive Before Backup EMC recommended practice 2 1 Backup/recovery process

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with

More information

Cisco MDS 9000 Family Solution for Cloud Storage

Cisco MDS 9000 Family Solution for Cloud Storage Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5

More information

VMware Backup: Top 10 Reasons to Choose Veeam. Veeam Backup & Replication vs. Legacy Backup Tools. Better by design

VMware Backup: Top 10 Reasons to Choose Veeam. Veeam Backup & Replication vs. Legacy Backup Tools. Better by design VMware Backup: Veeam Backup & Replication vs. Legacy Backup Tools Top 10 Reasons to Choose Veeam Veeam Backup & Replication isn t the only way to back up your virtual environment but it is the best way.

More information

Cloud and EVault Endpoint Protection Your best friend in Data Protection

Cloud and EVault Endpoint Protection Your best friend in Data Protection Cloud and EVault Endpoint Protection Your best friend in Data Protection Diing Yu Chen Director, Asia Pacific Controls how, when and where data is backed up and recovered from your cloud environment. EVault,

More information

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation : Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use

More information

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution.

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution. DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering. Easy-to-use Backup and Recovery solution. Data protection and disaster recovery in a single solution. Scalable

More information

Putting your cloud to work

Putting your cloud to work Putting your cloud to work Strategies to drive adoption and utilization for critical business applications Paul F Hartzell EVault VP APAC Sam Chong TVC Pte Ltd - Singapore 11/19/2013 2012 EVault, Inc.

More information

Take Advantage of Data De-duplication for VMware Backup

Take Advantage of Data De-duplication for VMware Backup Take Advantage of Data De-duplication for VMware Backup Lauren Whitehouse Analyst, Enterprise Strategy Group Tom Martin Avamar Product Management, EMC Mike Zolla Avamar Chief Architect, EMC 1 EMC Avamar

More information

Hybrid Business Cloud Backup

Hybrid Business Cloud Backup Hybrid Business Cloud What it is. What it s good for. Tom Gallivan Vice President of Sales February 25 th, 2014 2 AGENDA Hybrid Business Cloud 1 2 3 4 5 Data Loss and Cloud vs. Hybrid Business Cloud Sizing

More information

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved. Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009

More information

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation Introduction to Data Protection: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała Data Deduplication in Tivoli Storage Manager Andrzej Bugowski 19-05-2011 Spała Agenda Tivoli Storage, IBM Software Group Deduplication concepts Data deduplication in TSM 6.1 Planning for data deduplication

More information

Virtualization Support - Real Backups of Virtual Environments

Virtualization Support - Real Backups of Virtual Environments Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

Efficient Backup with Data Deduplication Which Strategy is Right for You?

Efficient Backup with Data Deduplication Which Strategy is Right for You? Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

G-Cloud 6 Service Definition DCG Cloud Backup Service

G-Cloud 6 Service Definition DCG Cloud Backup Service G-Cloud 6 Service Definition DCG Cloud Backup Service G-Cloud 6, Service Description, DCG Cloud Backup Service Page 1 of 23 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W:

More information

Best Practices for Using Symantec Online Storage for Backup Exec

Best Practices for Using Symantec Online Storage for Backup Exec WHITE PAPER: xxxxxx Data Protection [00-Cover_Bar] Best Practices for Using Symantec Online Storage for Backup Exec Confidence in a connected world. White Paper: Data Protection Best Practices for Using

More information

Complete Storage and Data Protection Architecture for VMware vsphere

Complete Storage and Data Protection Architecture for VMware vsphere Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

IBM Tivoli Storage Manager

IBM Tivoli Storage Manager Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing

More information

Optimizing Data Protection Operations in VMware Environments

Optimizing Data Protection Operations in VMware Environments Optimizing Data Protection Operations in VMware Environments March 2009 Data protection is critical for small and medium business (SMB) customers. Evolving business and regulatory mandates are driving

More information

Always On: Unitrends DRaaS Disaster Recovery Services

Always On: Unitrends DRaaS Disaster Recovery Services Solution Brief Always On: Unitrends DRaaS Disaster Recovery Services What keeps you up at night? Are you thinking about what would happen to your business in the event of a disaster? Are you worrying about

More information

HIPAA Security Matrix

HIPAA Security Matrix HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software

More information

Veritas Backup Exec 15: Deduplication Option

Veritas Backup Exec 15: Deduplication Option Veritas Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated

More information

Online Backup Plus Frequently Asked Questions

Online Backup Plus Frequently Asked Questions Online Backup Plus Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which

More information

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication If you rethink your backup strategy, then think of ETERNUS CS800

More information

IBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008

IBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008 IBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008 IBM Information Infrastructure Proven Capabilities Manage Information Risks Information

More information

Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or

Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or 11/09/2015 Backup Appliance or Backup Software? Article on things to consider when looking for a backup solution. Ray Quattromini FORTUNA POWER SYSTEMS LTD T: 01256 782030 E: RAY@FORTUNADATA.COM W: WWW.FORTUNADATA.COM

More information

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution April 2013 Page 1 Protect your plant data with the solution. Best-in-class offering Easy-to-use solution Data protection and disaster recovery in a single solution Scalable architecture and functionality

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

HyperQ DR Replication White Paper. The Easy Way to Protect Your Data

HyperQ DR Replication White Paper. The Easy Way to Protect Your Data HyperQ DR Replication White Paper The Easy Way to Protect Your Data Parsec Labs, LLC 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com info@parseclabs.com

More information

EOH Cloud Services - EOH Cloud Backup - Server

EOH Cloud Services - EOH Cloud Backup - Server EOH Cloud Services - EOH Cloud Backup - Server EOH Cloud Backup - Server Page 1 EOH Cloud Backup - Server Reliable backup and recovery is critical in today s information-driven business. Besides the sheer

More information

CA ARCserve Backup: Protecting heterogeneous NAS environments with NDMP

CA ARCserve Backup: Protecting heterogeneous NAS environments with NDMP WHITE PAPER: CA ARCserve Backup Network Data Management Protocol (NDMP) Network Attached Storage (NAS) Option: Integrated Protection for Heterogeneous NAS Environments CA ARCserve Backup: Protecting heterogeneous

More information

FAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS

FAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS FAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS Version 1.3 October 2011 1. What are Riverbed Whitewater cloud storage gateways for data protection? Riverbed Whitewater appliances are drop-in cloud

More information

Data Reduction Methodologies: Comparing ExaGrid s Byte-Level-Delta Data Reduction to Data De-duplication. February 2007

Data Reduction Methodologies: Comparing ExaGrid s Byte-Level-Delta Data Reduction to Data De-duplication. February 2007 Data Reduction Methodologies: Comparing ExaGrid s Byte-Level-Delta Data Reduction to Data De-duplication February 2007 Though data reduction technologies have been around for years, there is a renewed

More information

Tiered Data Protection Strategy Data Deduplication. Thomas Störr Sales Director Central Europe November 8, 2007

Tiered Data Protection Strategy Data Deduplication. Thomas Störr Sales Director Central Europe November 8, 2007 Tiered Data Protection Strategy Data Deduplication Thomas Störr Sales Director Central Europe November 8, 2007 Overland Storage Tiered Data Protection = Good = Better = Best! NEO / ARCvault REO w/ expansion

More information

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION? WHAT IS FALCONSTOR? FalconStor Optimized Backup and Deduplication is the industry s market-leading virtual tape and LAN-based deduplication solution, unmatched in performance and scalability. With virtual

More information

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services Pixius Advantage Outsourcing Managed Services Move forward with endpoint protection by understanding its unique requirements. As the number of information workers rises, so does the growth and importance

More information

Business Benefits of Data Footprint Reduction

Business Benefits of Data Footprint Reduction Business Benefits of Data Footprint Reduction Why and how reducing your data footprint provides a positive benefit to your business and application service objectives By Greg Schulz Founder and Senior

More information

ExaGrid Product Description. Cost-Effective Disk-Based Backup with Data Deduplication

ExaGrid Product Description. Cost-Effective Disk-Based Backup with Data Deduplication ExaGrid Product Description Cost-Effective Disk-Based Backup with Data Deduplication 1 Contents Introduction... 3 Considerations When Examining Disk-Based Backup Approaches... 3 ExaGrid A Disk-Based Backup

More information

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup

More information

Availability Digest. www.availabilitydigest.com. Data Deduplication February 2011

Availability Digest. www.availabilitydigest.com. Data Deduplication February 2011 the Availability Digest Data Deduplication February 2011 What is Data Deduplication? Data deduplication is a technology that can reduce disk storage-capacity requirements and replication bandwidth requirements

More information

Real-time Compression: Achieving storage efficiency throughout the data lifecycle

Real-time Compression: Achieving storage efficiency throughout the data lifecycle Real-time Compression: Achieving storage efficiency throughout the data lifecycle By Deni Connor, founding analyst Patrick Corrigan, senior analyst July 2011 F or many companies the growth in the volume

More information

Key Considerations and Major Pitfalls

Key Considerations and Major Pitfalls : Key Considerations and Major Pitfalls The CloudBerry Lab Whitepaper Things to consider before offloading backups to the cloud Cloud backup services are gaining mass adoption. Thanks to ever-increasing

More information

EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter

EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter ROMA 18/09/2013 JUKU UNPLUGGED Antonio Naletto - antonio.naletto@evault.com 28/09/13 2012 EVault, Inc. All Rights Reserved

More information

Deduplication has been around for several

Deduplication has been around for several Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding

More information

Best Practices for Protecting Laptop Data

Best Practices for Protecting Laptop Data Laptop Backup, Recovery, and Data Security: Protecting the Modern Mobile Workforce Today s fast-growing highly mobile workforce is placing new demands on IT. As data growth increases, and that data increasingly

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

Data Deduplication and Tivoli Storage Manager

Data Deduplication and Tivoli Storage Manager Data Deduplication and Tivoli Storage Manager Dave Cannon Tivoli Storage Manager rchitect Oxford University TSM Symposium September 2007 Disclaimer This presentation describes potential future enhancements

More information

Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE

Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that

More information

Backup and Recovery: The Benefits of Multiple Deduplication Policies

Backup and Recovery: The Benefits of Multiple Deduplication Policies Backup and Recovery: The Benefits of Multiple Deduplication Policies NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change

More information

Complete Data Protection & Disaster Recovery Solutions

Complete Data Protection & Disaster Recovery Solutions Complete Data Protection & Disaster Recovery Solutions Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After

More information

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this

More information

Eight Considerations for Evaluating Disk-Based Backup Solutions

Eight Considerations for Evaluating Disk-Based Backup Solutions Eight Considerations for Evaluating Disk-Based Backup Solutions 1 Introduction The movement from tape-based to disk-based backup is well underway. Disk eliminates all the problems of tape backup. Backing

More information

Dell PowerVault DL Backup to Disk Appliance Powered by CommVault. Centralized data management for remote and branch office (Robo) environments

Dell PowerVault DL Backup to Disk Appliance Powered by CommVault. Centralized data management for remote and branch office (Robo) environments Dell PowerVault DL Backup to Disk Appliance Powered by CommVault Centralized data management for remote and branch office (Robo) environments Contents Executive summary Return on investment of centralizing

More information

Implementing Disaster Recovery? At What Cost?

Implementing Disaster Recovery? At What Cost? Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become

More information

Best Practices Guide. Symantec NetBackup with ExaGrid Disk Backup with Deduplication. 2012 ExaGrid Systems, Inc. All rights reserved.

Best Practices Guide. Symantec NetBackup with ExaGrid Disk Backup with Deduplication. 2012 ExaGrid Systems, Inc. All rights reserved. Best Practices Guide Symantec NetBackup with ExaGrid Disk Backup with Deduplication 2012 ExaGrid Systems, Inc. All rights reserved. Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION... 2 AUDIENCE...

More information

Barracuda Backup Server. Introduction

Barracuda Backup Server. Introduction Barracuda Backup Server Introduction Backup & Recovery Conditions and Trends in the Market Barracuda Networks 2! Business Continuity! Business today operates around the clock Downtime is very costly Disaster

More information

Future-Proofed Backup For A Virtualized World!

Future-Proofed Backup For A Virtualized World! ! Future-Proofed Backup For A Virtualized World! Prepared by: Colm Keegan, Senior Analyst! Prepared: January 2014 Future-Proofed Backup For A Virtualized World Like death and taxes, growing backup windows

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

ESG REPORT. Data Deduplication Diversity: Evaluating Software- vs. Hardware-Based Approaches. By Lauren Whitehouse. April, 2009

ESG REPORT. Data Deduplication Diversity: Evaluating Software- vs. Hardware-Based Approaches. By Lauren Whitehouse. April, 2009 ESG REPORT : Evaluating Software- vs. Hardware-Based Approaches By Lauren Whitehouse April, 2009 Table of Contents ESG REPORT Table of Contents... i Introduction... 1 External Forces Contribute to IT Challenges...

More information

Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data

Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White

More information

DEDUPLICATION BASICS

DEDUPLICATION BASICS DEDUPLICATION BASICS 4 DEDUPE BASICS 12 HOW DO DISASTER RECOVERY & ARCHIVING FIT IN? 6 WHAT IS DEDUPLICATION 14 DEDUPLICATION FOR EVERY BUDGET QUANTUM DXi4000 and vmpro 4000 8 METHODS OF DEDUPLICATION

More information

EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE

EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE INTRODUCTION IT organizations today grapple with two critical data storage challenges: the exponential growth of data and an increasing need to keep more data for

More information

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved. Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker

More information