An IT Briefing produced by. Archiving. Sponsored By:
|
|
- Eustace Melton
- 8 years ago
- Views:
Transcription
1 An IT Briefing produced by
2 By George Crump 2008 TechTarget BIO George Crump is President and founder of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. With 25 years of experience designing storage solutions for data centers across the United States, Crump has seen the birth of such technologies as RAID, NAS, and SAN. Prior to founding Storage Switzerland, he was CTO of one of the nation's largest storage integrators, where he was in charge of technology testing, integration, and product selection. This IT Briefing is based on an Arrow/TechTarget Webcast,. This TechTarget IT Briefing covers the following topics: Introduction About Storage Switzerland Why The Archive Problem From Compliance to Litigation Storage Management Backup and Recovery Backup Archives Archive Solutions Integrator Advice Software Recommendations Hardware Recommendations Conclusion Common Questions Copyright 2008 George Crump. All Rights Reserved. Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowed under the copyright laws. About TechTarget IT Briefings TechTarget IT Briefings provide the pertinent information that senior-level IT executives and managers need to make educated purchasing decisions. Originating from our industry-leading Vendor Connection and Expert Webcasts, TechTarget-produced IT Briefings turn Webcasts into easy-to-follow technical briefs, similar to white papers. Design Copyright TechTarget. All Rights Reserved. For inquiries and additional information, contact: Dennis Shiao Director of Product Management Webcasts, TechTarget dshiao@techtarget.com
3 Introduction This document addresses why archiving continues to be an important subject for integrators to raise with their customers, provides an overview of current management problems and some potential solutions, and finally offers advice on how integrators should be approaching this market. About Storage Switzerland Storage Switzerland is an independent analyst group that focuses primarily on the data storage and IT virtualization marketplaces. Storage Switzerland provides strategic consulting to manufacturers, resellers, integrators, and end users of data storage and IT virtualization technologies. They have a complete testing facility to validate products and solutions, and publish articles and white papers online in SearchStorage, ByteandSwitch, SearchData- Backup, and SearchStorageChannel. Their website, is updated weekly and contains over 70 articles, white papers, and product reviews from their laboratories. Why archiving is not a heavily penetrated market, despite publicity to the contrary. Most current customers are regulated by the SEC. Government regulations drove their implementation. Now the market is moving beyond regulation into retention and management for litigation readiness. Furthermore, continues to present a storage management and data protection problem, which an archive can help address. Some integrators may believe that the low-hanging fruit has already been picked. While it is true that large companies who were forced to make an archiving decision have already done so, significant opportunities exist in the litigation readiness and management spaces. A greater concern, from an integrator perspective, is the confusion over what should be retained and for how long. This confusion results in long, unproductive conversations with 1 IT Briefing: customers about retention problems. However, once integrators are educated about the issue, they can add significant value for their customers. Finally, customers may believe they can address storage management issues by updating their packages or restricting their users. The most common solution is to restrict the volume of per user. Some restrictions can be so small as to allow only a single day s traffic. At the other end of the spectrum, systems have improved abilities to retain large volumes of for a long time. However, this creates data protection problems as well as other issues addressed later in this document. The Archive Problem Figure 1 shows a graph of the compounded annual growth rate of the archiving market. The market is estimated to grow at about a 40% compound annual growth rate through Figure 1 also shows that archiving is an untapped market. The market is not restricted to upgrades for existing systems. In the next three years, the percentage of companies implementing archiving is expected to increase from about 22% to about 61% of available organizations. These statistics from Osterman Research indicate significant potential growth and therefore significant opportunity in the market today. From Compliance to Litigation The shift from compliance to litigation is the driving force behind this growth. Companies forced into compliance adopted archiving early. Litigation affects a broader section of the market. Sixty percent of companies with 10 or more employees have faced more than one lawsuit in their first 10 years of existence. Ninety-five percent of all discovery requests last year involved delivering a range of s. The company forced to deliver under discovery may not be the one being litigated against. For example, if a vendor is under litigation, that vendor s customers may be required to deliver all correspondence with the vendor. Finally, 50% of all litigation costs come from fulfilling pretrial discovery requests. Significant money is being spent to fulfill pretrial requests, even
4 Figure 1 if the company involved is not part of the lawsuit. Some current headlines include: Wachovia Fined $2.3 Million for Not Complying With SEC 17a Bank of America Securities to Pay SEC $10 Million Fine Morgan Stanley Fined $15 Million for Violations SEC Fines Seven More Broker/Dealers New headlines appear every week, a situation that will most likely continue. Storage Management System administrators continue to set mailbox restrictions, which in turn force users to export data to.pst files, a practice often endorsed by those same system administrators. Typically,.pst files are stored on the network, creating two problems. The first is a backup problem. One customer with a 50 MB restriction on user mailboxes, but with 14,000 users, had over 30 terabytes of.pst files stored on dedicated file servers or network-attached storage (NAS) devices. It became a major backup problem because one addition to a.pst file forced the backup application to back up the entire file. It was also a major storage problem. Second, the company is not protecting itself from litigation discovery by storing data in.pst files. These files can easily be requested, imported into a discovery application, indexed, and searched for specific information. Restricting mailbox size simply trades storage management problems in the application for storage management problems on the storage side. Another major issue around restricting mailbox size is loss in user productivity. The Osterman study referenced above showed that average users spent 1.5 to 2 hours a day not writing or replying to but simply managing their , deciding whether to put the in a.pst file, move it into a folder, or delete it. Another ramification is that, if a limitation is imposed on mailbox size, the users who reach it cannot send or receive until they reduce their mailbox size. Suddenly this becomes their top priority, regardless of other business issues. 2 IT Briefing:
5 The other option is to let the store grow. Modern applications allow for significantly larger stores than in the past, making this a possibility. However, unlimited growth will affect overall system performance and become a data protection challenge as well. Approximately 60% of decision makers in the Osterman study cited the growth in storage as a serious or very serious problem. Backup and Recovery Backup and recovery in the Exchange environment has improved significantly over the past 3 to 4 years. Most backup applications can do some sort of message-level backup and recovery, but with a few exceptions it is still a very slow process. Additionally, the number of point solutions designed to protect or enhance the Exchange environment has exploded. In many cases, these are additions to existing applications designed to give them some Exchange intelligence. For example, in Snapshots it might be an Exchange module that puts the Exchange database into a backup mode to get a clean snapshot of the message store. The multiplicity of point solutions creates multiple protection processes, all of which must be managed, which in itself is a problem. archiving can to a large extent address and in many cases eliminate the need for point solutions. Backup Archives Many customers think they can rely on their tape or disk-to-disk backup as their mechanism for archiving. These customers need to understand a typical process for recovery from a backup. First the customer needs to set up a target server. Then they have to determine which files cover the date range of the discovery request. In many cases, discovery covers every sent in the past relating to the case, which can be a large range. It can be very difficult to identify the needed files. Backup applications keep indexes cross-referencing files to tapes. These indexes can get very large and it is common practice to purge them after a period of time. If the file has been purged, the entire tape has to be rescanned into the backup application. If the correct tape has been selected, the application can search for relevant files, which can be extremely slow. If not, another tape has to be rescanned and the process repeated. Unfortunately, in some cases companies believe they have found the correct backups and extracted all relevant s. Then opposing counsel presents an they missed, and they look like they are hiding something, or are even fined. While most users understand at some level the process of recovery from a backup, it is useful to walk through the steps involved in a manual recovery of data. Archive Solutions A common archive architecture includes an archive server. As s are received they are copied in real time or on a schedule to the archive server. That server stores the on a database often called a container file to a local, relatively high-speed, very reliable disk. These are not the types of disks bought cheaply on the Internet, because they have to be extremely reliable. The containers generally store a preset number of s. When the container is full, another container is created and linked to the previous container. As containers age and become less relevant, they potentially can be moved to a less expensive storage medium. Traditionally, this has been tape or optical, but can also be one of the focused archived disk technologies that exist today. The point is that, with containers, users can move data to less expensive storage as time goes on. Two general classes of solutions are available today. At a high level, the debate is between hosted or internal solutions. Hosted solutions are interesting especially for smaller businesses. In a hosted solution, s are sent simultaneously to the customer s and to the provider s server. The provider stores, organizes, and indexes the s as they arrive. In a discovery, the provider assembles the data. The advantages of a hosted solution are lower up-front costs and no need for the internal staff and resources required to deploy and manage an internal archiving solution. The disadvantages are that costs increase in the long term, because more and more data is stored over time. Furthermore, most users resist handing over corporate assets, especially s, to a third party. Legitimate technology concerns exist over confirmation that the has arrived at the hosted site, as well as the bandwidth requirements between the sites. It is difficult for an integrator to participate unless they are also a provider. Integrator participation, if any, is in the form of an agent s fee. Finally, anecdotal evidence exists about slow search-andretrieval response times. Of these concerns, the primary ones are the increasing costs over time and handing over corporate assets. The primary advantage of an internal solution is that all components are purchased and owned by the customer. Integrators can have a significant role to play; however, the selection process can be confusing. 3 IT Briefing:
6 Many archive solutions are available, with new solutions and upgrades to existing solutions released every year. One customer had reviewed 15 different archive solutions. Customers also have to choose between archive-specific and integrated solutions, which are discussed in more detail later. The initial cost of an internal solution is higher because of the equipment and software that must be purchased, as well as implementation costs, but it is typically less expensive in the long term than a hosted solution. Finally, users must choose between a wide range of software solutions, hardware solutions, and now turnkey appliance solutions that integrate hardware and software into a single black box solution. Integrator Advice In this market, integrators still need to help their customers understand why they should implement archiving. Litigation is a viable reason. One challenge is from those customers who say, for example, that they only retain for 30 days the short-term retention problem. An illustration similar to that shown in Figure 2 can help counter this argument. It shows the life of a typical , illustrating how an can begin as a single exchange between two users on the company server. The recipient then forwards the to other users, who may then copy it to a.pst file, a personal account, or a laptop. As shown in Figure 3, deleting the on the server does remove it from that server. However, the persists in a number of other locations, two of which, illustrated by the blue dots, may not be accessible. The problem with a short-term deletion policy is that users may end up deleting the evidence they need to defend themselves. For example, a company was the subject of a human resources-related lawsuit regarding inappropriate . The recipient had forwarded the offending to a private account and so had a copy of it. The company had no archive in place and had deleted any evidence of the file. By accident, the company found the user s.pst file on a laptop that had not been reissued. In that.pst file, the company found an in which the user had forwarded the offending to a friend saying, Isn t this funny? Obviously the user was not offended. If the company had had an archive application, it could have easily found every instance of the , instead of relying on luck. In some cases, the discussion moves to the legal issues around a short-term retention policy. In many cases, it is frankly illegal. However, in most cases the Figure 2 4 IT Briefing:
7 Figure 3 company is simply removing its ability to defend itself, as the relevant s almost certainly exist somewhere else. Long-term retention is another challenge. Here the company decides to keep s forever, to always be protected. This strategy exposes the entire company history, but it is more defensible than short-term deletion. However the archiving application must offer sophisticated search and index capabilities, so that the index files are kept small and manageable. The final challenge is the hardest to overcome. For lack of a better term, call it Our legal counsel said. In this case, IT simply hands the problem over to legal. While it is no longer an IT issue, the company is still potentially at risk. One approach might be to try to talk directly with legal. Within IT, another approach is to shift the focus to storage management or data protection and recovery. Within storage management, the impact of.pst files on the network and on backup and the impact of very large stores are of considerable concern. Because applications can create very large stores, IT must buy more expensive primary storage and provide more server bandwidth. Data protection and recovery conversations can focus on the value of continuous protection solutions and application-aware snapshots. Software Recommendations In general, software falls into the category of either integrated or archive-specific tools. CommVault Software offers an example of the integrated approach. CommVault has made a large central application and connected backup, archiving, file archiving, and other functionality to it. This solution s value is that the same metadata database is used for backup and for archiving. The Intradyn archive appliance offers an ideal solution for integrators who are new to archiving or do not have a large professional services staff. This is a black box that connects to the network and simply starts archiving data. This solution allows the integrator to begin participating in the archive space, especially for small- to medium-sized businesses. Archive-specific tools include Mimosa, Symantec, and EMC Software. While Symantec and EMC have backup and other applications, the applications are 5 IT Briefing:
8 not fully integrated. Mimosa is a relatively new player on the market, focused solely on archiving. They have also built a file archive engine that leverages the archive, so they can generate multiple copies of similar files. Approximately 14 other archive applications exist, but Mimosa, Symantec, and EMC Software are ones that Storage Switzerland sees as being best received by end users. Hardware Recommendations Regarding hardware, users should not simply install the most inexpensive disk array available. Disk archive solutions designed specifically for this type of environment include EMC Centerra and Permabit Enterprise Disk Archive. These are examples of Content Addressable Storage (CAS)-based systems. These systems fingerprint the file and leverage that fingerprint to reduce duplicate data. The fingerprint also supports data-integrity checking over time. These systems are also scalable. Both the EMC and Permabit systems are grid-architected solutions, where storage can be increased by adding nodes to the grid cluster. They can grow into the high terabyte to petabyte size. A wide range of well-known tape and optical solutions also exist. While many customers are moving to disk-based archiving solutions, for some, tape solutions still make sense. The only concern is that media format changes over time. Tapes today may not be readable 10 years from now. Integrators should be sure to include a stop point in the plans they offer, where the customer migrates to a new technology at a point when both old and new technologies are available. Conclusion archiving remains an excellent market for storage integrators. Integrated appliances offer easier ways to get into the market. Software applications are more mature. Integrators no longer need to be as heavily involved in regulatory affairs as in the past. Certainly customer perceptions offer challenges to be overcome, but reliable solutions exist for integrators to recommend. 6 IT Briefing:
9 Common Questions Question: You said that the number of companies who will invest in archiving will increase from 22% of the available market to approximately 60% by Have integrators and resellers who are not actively involved in this business missed the boat? Answer: No, I do not think so. Clearly, the early movers have some advantages, especially related to the SEC and regulated businesses. However, second generation solutions are easier to learn, understand, and implement. In a fast growing market such as this, I think you could become a valuable participant even if you are starting from ground zero. Question: You mentioned the second generation of some of these products. Are these products mature enough to be reliable? Answer: That is a very good question. Data loss occurs at all levels whether the applications are new or mature. Generally it occurs infrequently. In many cases, it is a result of user errors, which are hard to admit, or integrator errors, which are even harder to admit. Furthermore, it is something that is very difficult for an integrator to test in a lab. During implementation, integrators will have to deal with a far larger volume of than most have available for testing. When choosing a solution, it is best to check references other than those the solution provider offers. Research their installed base and go directly to some customers, or talk with resellers who are not your direct competitors. Question: Most people think that backup is the key, but the critical aspect is recovery. However, recovery often seems to be an afterthought. Answer: Absolutely. We have often interviewed customers who never tested recovery. Integrators who are fortunate enough to have labs should test as many de-archives as possible. When speaking with customers, ask them if they have had any problems with recovery. At the same time, recognize that no product works flawlessly every time. Understand that mistakes will happen and your job as an integrator is to understand how those mistakes occur and help your end users avoid those situations. Question: Assuming a customer wants an internal archiving system, does it make sense to select an integrated over an archive-specific solution based on customer size? Answer: The physical size of the end user matters less than the specific characteristics of the archive they require. Whether the solution is integrated or standalone, look at the strength of the archive application as a standalone entity, and then count everything else as a bonus. If your issue is how many s per day the system can handle, do not believe the solution provider s numbers but talk with their customers. Question: Then it is a matter of prioritizing your needs and basing your decision on your needs? Answer: Absolutely. If the loss of an is cataclysmic, then you should be prepared to sacrifice some speed for 100% integrity. If speed is more important then, odd as it sounds, you might want to sacrifice some integrity. Question: Do you have any final thoughts? Answer: If you already have an existing archive application, now might be a good time to consider other options. Existing products have been upgraded and new entrants in the field have products that might be worth considering. Especially if your archiving solution has not worked particularly well for you, this might be a good time to revisit it. 7 IT Briefing:
10 About TechTarget We deliver the information IT pros need to be successful. TechTarget publishes targeted media that address your need for information and resources. Our network of technology-specific Web sites gives enterprise IT professionals access to experts and peers, original content, and links to relevant information from across the Internet. Our events give you access to vendor-neutral, expert commentary and advice on the issues and challenges you face daily. Our magazines give you in-depth analysis and guidance on the critical IT decisions you face. Practical technical advice and expert insights are distributed via specialized e-newsletters, video TechTalks, podcasts, blogs, and wikis. Our Webcasts allow IT pros to ask questions of technical experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events, the expert interaction of Webcasts, the laser-targeting of e-newsletters, and the richness and depth of our print media to create compelling and actionable information for enterprise IT professionals. Arrow_07_2008_ IT Briefing:
Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends
A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market
More informationOptimizing Data Efficiency with Windows File Server and Storage Consolidation
An IT Briefing produced by Optimizing Data Efficiency with Windows File Server and Storage Consolidation By Pete Brey 2008 TechTarget BIO Pete Brey is the Technical Marketing Director for HP s Enterprise
More informationGetting Started With E-mail Archiving for Exchange
An IT Briefing produced by By Brien Posey 2008 TechTarget BIO Brien Posey is a Microsoft Certified Systems Engineer and a technical author, who has produced thousands of articles, tips, and white papers
More informationA Blueprint for Tiered Storage
An IT Briefing produced by By Steve Duplessie 2004 TechTarget BIOS Steve Duplessie Steve is the Founder and Senior Analyst of the Enterprise Storage Group, recognized worldwide as the leading independent
More information2013 Cloud Storage Expectations
2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout
More informationE-mail Archiving Strategies: When Deleting is Not an Option
An IT Briefing produced by E-mail Archiving Strategies: When Deleting is Not an Option By Mark Diamond and Bill Tolson 2005 TechTarget BIOS Mark Diamond Mr. Diamond is founder, President & CEO of Contoural,
More informationA Practical Approach to Information Management
A Practical Approach to Information Management Solution Brief: Information Management Contents Information management isn t just a priority, it s mandatory.................................................
More informationWhite Paper. Why Should You Archive Your Email With a Hosted Service?
White Paper Why Should You Archive Your Email With a Hosted Service? An Osterman Research White Paper Published January 2008 Executive Summary Email is the primary communication system and file transport
More information3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
More informationHyper-V 3.0: Creating new virtual data center design options Top four methods for deployment
Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take
More informationBringing Together Data Integration and SOA
An IT Briefing produced by By David Linthicum 2008 TechTarget BIO David Linthicum is the CEO of the Linthicum Group LLC, an SOA consultancy. He is the former CEO of Bridgewerx and former CTO of Mercator
More informationArchiving A Dell Point of View
Archiving A Dell Point of View Dell Product Group 1 THIS POINT OF VIEW PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED
More informationIT Governance in an IBM Lotus Software Environment
An IT Briefing produced by IT Governance in an IBM Lotus Software Environment 2009 TechTarget This IT Briefing is based on a Sherpa Software/TechTarget Webcast, IT Governance in an IBM Lotus Software Environment.
More informationBusiness-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance
Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication If you rethink your backup strategy, then think of ETERNUS CS800
More informationManaging Virtual Desktop Environments
Managing Virtual Desktop Environments Desktop virtualization can be extremely beneficial to a company's operating system environment. Yet while working through the virtualization planning process, IT professionals
More informationArchiving and the Cloud: Perfect Together
Data Explosion At the 2010 Techonomy conference, Google CEO Eric Schmidt asserted that we are now generating more data every two days than we generated between the dawn of civilization and 2003. While
More informationSnapshot Technology: Improving Data Availability and Redundancy
Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot
More informationHOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT
E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage
More informationThe skinny on storage clusters
The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across
More informationIBM Information Archive for Email, Files and ediscovery
IBM Information Archive for Email, Files and ediscovery Simplify and accelerate the implementation of an end-to-end archiving and ediscovery solution Highlights Take control of your content with an integrated,
More informationEmail Archiving: To SaaS or not to SaaS?
Proofpoint Email Archiving Whitepaper: A look at the pros and cons of Software-as-a-Service and how they apply to email archiving. threat protection compliance archiving & governance secure communication
More informationMosaic Technology s IT Director s Series: Exchange Data Management: Why Tape, Disk, and Archiving Fall Short
Mosaic Technology s IT Director s Series: : Why Tape, Disk, and Archiving Fall Short Mosaic Technology Corporation * Salem, NH (603) 898-5966 * Bellevue, WA (425)462-5004 : Why Tape, Disk, and Archiving
More informationHow would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS
How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS How would lost data impact your business? What you don t know could hurt you You
More informationSOA and BPM: Aligning Business Needs with Your Architecture
An IT Briefing produced by SOA and BPM: Aligning Business Needs with Your Architecture By Srinath Nagabhirava 2008 TechTarget BIO Srinath Nagabhirava is Exec. Vice President at Adaequare Inc, a firm specializing
More informationHybrid cloud computing explained
computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted
More informationEssentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS
Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS M ost storage vendors now offer all-flash storage arrays, and many modern organizations recognize the need for these highperformance
More informationHow To Preserve Data In The Cloud
WHITE PAPER : Perfect Together for Data Preservation, Storage & Retention ROCC Computers Ltd Stanford Gate South Road Brighton BN1 6SB Tel: 01273 274716 Email: info@rocc.co.uk Email Archiving and the Cloud:
More informationSTORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside
Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among
More informationOsterman Research Executive Summary
Osterman Research Executive Summary Much of what is transmitted through an email system or an instant messaging (IM) system constitutes a record, or a document that must be kept for a minimum period of
More informationDesktop virtualization: Best practices for a seamless deployment
Desktop virtualization: Best practices for a For years, virtualization efforts have centered on servers and storage, as opposed to desktops and rightfully so. The technology has evolved faster with fewer
More informationData warehouse software bundles: tips and tricks
Data software bundles: tips and tricks Data software bundles: Data The emergence of data appliances has broadened the potential uses of business intelligence (BI) and analytics within many organizations
More informationThe changing face of scale-out networkattached
scale-out network-attached scale-out network-attached By: Carol Sliwa The face of network-attached (NAS) is changing. Enterprise IT shops are increasingly seeking out the latest wave of scale-out network-attached
More informationArchiving Email for Compliance and Competitive Advantage
Archiving Email for Compliance and Competitive Advantage An Osterman Research Position Paper sponsored by Published September 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
More informationWhite. Paper. The SMB Market is Ready for Data Encryption. January, 2011
White Paper The SMB Market is Ready for Data Encryption By Mark Peters January, 2011 This ESG White Paper was commissioned by Tandberg Data and is distributed under license from ESG. 2011, Enterprise Strategy
More informationRealizing the Cost Savings and Other Benefits from SaaS Email Archiving
y Realizing the Cost Savings and Other Benefits from SaaS Email Archiving An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by sponsored by Osterman Research, Inc. P.O. Box 1058
More informationBenefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
More informationLTO tape technology continues to evolve with LTO 5
with LTO 5 Despite the predictions from industry experts, tape isn t dead yet and it continues to serve as a low-cost option for long-term storage for many organizations. Like all data center technologies
More informationRecovering Microsoft Exchange Server Data
Recovering Microsoft Exchange Server Data An Altegrity Company 1 Why Recovering and Searching Email Archives Is Important 3 Why Recovering and Searching Email Archives Is Difficult 5 How Ontrack PowerControls
More informationEMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations
EMAIL ARCHIVING What it is, what it isn t, and how it can improve your business operations OVERVIEW: Why businesses are turning to email archiving As your business grows, communication between you and
More informationBusiness-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance
Intel Xeon processor Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication Intel Inside. Powerful Solution Outside. If
More informationInside Track Research Note. In association with. Enterprise Storage Architectures. Is it only about scale up or scale out?
Research Note In association with Enterprise Storage Architectures Is it only about scale up or scale out? August 2015 About this The insights presented in this document are derived from independent research
More informationIBM CommonStore email Archiving Preload Solution
Designed to simplify e-mail archiving to help support data protection, governance and compliance IBM CommonStore email Archiving Preload Solution Highlights This solution can help small to This end-to-end
More informationEXCHANGE TO OFFICE 365
EXCHANGE TO OFFICE 365 ARCHIVING CONSIDERATIONS by Brien Posey As an organization prepares to migrate mailboxes from an on premise Exchange Server to Office 365, it must carefully consider how the migration
More informationPacific Life Insurance Company
Pacific Life Insurance Company Pacific Life Turns Compliance into Business Advantage SOLUTION SNAPSHOT Applications: SAP, Oracle, Microsoft Exchange, Microsoft SQL Server, KVS, FileNet EMC Software: EMCControlCenter
More informationAUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK
White Paper AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK Abstract EMC Isilon SmartLock protects critical data against accidental, malicious or premature deletion or alteration. Whether you need to
More informationTips to ensuring the success of big data analytics initiatives
Tips to ensuring the success of big data Big data analytics is hot. Read any IT publication or website and you ll see business intelligence (BI) vendors and their systems integration partners pitching
More informationEmail Archiving: Common Myths and Misconceptions
White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504 www.messageone.com Introduction From the executive
More informationCLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE
E-Guide CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE SearchCloud Applications C loud application integration and continue to be some of the top for software developers. In this e-guide, learn
More informationCLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY?
E-Guide CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? SearchCloud Security M ore and more certifications are being created around cloud security. An expert looks at some of the more prominent
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes
More informationQuantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
More informationWHITE PAPER Email Archiving: The Facts Behind The Myths
Next Generation Email Archiving Appliances WHITE PAPER Email Archiving: The Facts Behind The Myths 8 Wellington Street East, Mezzanine Level, Toronto, Ontario, CANADA, M5E 1C5 Tel: 416.840.0418 1.888.JATHEON
More informationData Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
More informationRegulatory Compliance Requirements with VERITAS Enterprise Vault and Microsoft Windows Server Technologies
Meeting Regulatory Compliance Requirements with VERITAS Enterprise Vault and Microsoft Windows Server Technologies Creating an electronic messaging system to meet regulatory compliance requirements can
More informationBUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS
E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression
More informationState of Michigan Records Management Services. Guide to E mail Storage Options
State of Michigan Records Management Services Guide to E mail Storage Options E mail is a fast, efficient and cost effective means for communicating and sharing information. However, e mail software is
More informationState of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
More informationCloud Storage: Top Concerns, Provider Considerations, and Application Candidates
Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates As cloud technology and deployment models become increasingly sophisticated, once-wary storage professionals are plunging
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More informationSolution Brief: Creating Avid Project Archives
Solution Brief: Creating Avid Project Archives Marquis Project Parking running on a XenData Archive Server provides Fast and Reliable Archiving to LTO or Sony Optical Disc Archive Cartridges Summary Avid
More informationEmail Management in Today s Regulatory Environment
Email Management in Today s Regulatory Environment An Altegrity Company 1 Why Recovering and Searching Email Archives Is Important 3 Why Recovering and Searching Email Archives Is Difficult 5 How Ontrack
More informationShould You Outsource Your Email?
Should You Outsource Your Email? By: Brien M. Posey According to a recent study by Symantec and Gartner (http://www.itworld.com /Webcasts /bytopic/3/index.html), most companies consider email to be a mission
More informationEfficient SAN-Based Tape Encryption
An IT Briefing produced by By W. Curtis Preston and Doug Anderson 2008 TechTarget BIOS W. Curtis Preston is the Vice President of Data Protection Services at GlassHouse Technologies. He wrote Using SAN
More informationEmail Archiving Benefits
www.sonasoft.com INTRODUCTION In this digital age, small and medium businesses (SMBs) continue to rely heavily on e mail as their primary form of business communications. This has led to a proliferation
More informationWhitepaper: Journaling: There s More Than One Way to Retain Your Data September 2012
888.427.5505 Whitepaper: Journaling: There s More Than One Way to Retain Your Data September 2012 Prepared by Dan Levine, Principal Engineer Globanet 15233 Ventura Blvd., Ste. 1140 Sherman Oaks, CA 91403
More informationDisaster Recovery Strategies: Business Continuity through Remote Backup Replication
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
More informationTIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE
E-Guide TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE SearchSolidState Storage F lash storage might seem like an easy answer for your applications because of its high performance, but deciding where to
More informationReducing Storage TCO With Private Cloud Storage
Prepared by: Colm Keegan, Senior Analyst Prepared: October 2014 With the burgeoning growth of data, many legacy storage systems simply struggle to keep the total cost of ownership (TCO) in check. This
More informationPlanning and Deploying a Disaster Recovery Solution
Planning and Deploying a Disaster Recovery Solution Produced by SearchStorage.com Presenters: Jon Bock and Ian Selway Sponsored by Copyright 2008 HP. All Rights Reserved. Reproduction, adaptation, or translation
More informationExchange Server 2010 backup and recovery tips and tricks
Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering
More informationEvery organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its
DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationEvaluating SaaS vs. on premise for ERP systems
Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn
More informationUnlocking data with document capture and imaging
Unlocking data with capture and imaging Unlocking data with Before organizations can banish paper from the office, proper and capture processes must be adopted. This E-Guide reveals the keys to effective
More informationWhite Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip
White Paper By Bob Spurzem and Martin Tuip Mimosa Systems, Inc. January 2008 Mimosa NearPoint for Microsoft Exchange Server Next Generation Email Archiving for Exchange Server 2007 CONTENTS Email has become
More informationE-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal
More informationTHE CASE FOR ACTIVE DATA ARCHIVING
THE CASE FOR ACTIVE DATA ARCHIVING Written by Ray Quattromini 3 rd September 2007 Contact details Tel: 01256 782030 / 08704 286 186 Fax: 08704 286 187 Email: sales@data-storage.co.uk Web: www.data-storage.co.uk
More informationGreen Computing Beyond the Data Center
An IT Briefing produced by By Helen Cademartori 2007 TechTarget BIO Author: Helen Cademartori Sr. IT Business Manager, Board Member CTB Helen Cademartori is a member of the board of CTB. She has worked
More informationEfficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA
Efficiently Protect, Manage and Access Big Data Nigel Tozer Business Development Director EMEA WHAT WE DO We are relentlessly focused on giving companies better, more cost-effective ways to protect, manage,
More informationWhite. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014
White Paper EMC Isilon: A Scalable Storage Platform for Big Data By Nik Rouda, Senior Analyst and Terri McClure, Senior Analyst April 2014 This ESG White Paper was commissioned by EMC Isilon and is distributed
More informationEXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments. Published April 2015
EXECUTIVE BRIEF Third-Party Archiving Solutions Are Still Needed in Exchange Environments An Osterman Research Executive Brief sponsored by Published April 2015 SPON sponsored by Osterman Research, Inc.
More informationWhy You Should Consider Cloud- Based Email Archiving. A whitepaper by The Radicati Group, Inc.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Why You Should Consider Cloud- Based
More informationManaging Data Center Growth Explore Your Options
Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,
More informationHYBRID ARCHITECTURE IN THE CLOUD
Revision 7.12-4 HIE ELECTRONICS: HYBRID ARCHITECTURE IN THE CLOUD Discussion of the Cloud and Tiered Architecture Hie Electronics, Inc. Copyright 2012 Introduction This paper compares some of the most
More informationEMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst
White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned
More informationTurnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
More information" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Datto Makes Virtual Hybrid Cloud Backup Easy! Product Analysis!
! Product Analysis! Datto Makes Virtual Hybrid Cloud Backup Easy! Prepared by: Colm Keegan, Senior Analyst! Prepared: October 2014 Datto Makes Virtual Hybrid Cloud Backup Easy Many businesses and service
More informationios7: 3 rd party or platform-enabled MAM? Taking a look behind the scenes with Jack Madden
ios7: 3 rd party or platform-enabled? Taking a look behind the scenes with Jack Madden party and platform-enables difference between 3rd party and platform-enabled Jack Madden You re probably well aware
More informationArchiving and The Federal Rules of Civil Procedure: Understanding the Issues
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com
More informationDAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization
DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain
More informationThe Risk-Cost Retention Model: Randolph A. Kahn, Esq. At the Core
The Risk-Cost Retention Model: A New Approach to Records Retention Bringing all stakeholders to the table to discuss the risk and cost involved in retention decisions allows a company to create the best
More informationVeritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
More informationEMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, 16.10.2008. Copyright 2008 EMC Corporation. All rights reserved.
EMC arhiviranje Lilijana Pelko Primož Golob Sarajevo, 16.10.2008 1 Agenda EMC Today Reasons to archive EMC Centera EMC EmailXtender EMC DiskXtender Use cases 2 EMC Strategic Acquisitions: Strengthen and
More informationAdvice for Virtualizing Exchange 2010 Server Roles
E-Guide Advice for Virtualizing Exchange 2010 Server Roles When virtualizing Exchange Server 2010, it's important to correctly configure virtual machines (VMs) that will host certain Exchange Server roles
More informationQStar White Paper. Tiered Storage
QStar White Paper Tiered Storage QStar White Paper Tiered Storage Table of Contents Introduction 1 The Solution 1 QStar Solution 3 Conclusion 4 Copyright 2007 QStar Technologies, Inc. QStar White Paper
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationBest and worst practices for Exchange email archiving
practices for Exchange email archiving Managing an email system can be difficult and frustrating. Add to that the burden of email archiving and even the most experienced IT pro is challenged. In this expert
More information2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business
Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...
More informationOPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
More information