Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

Size: px
Start display at page:

Download "Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES"

Transcription

1 Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES

2 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential to DATACENTERTECHNOLOGIES. No part of this publication may be reproduced in whole or in part, stored in a retrieval system, or transmitted in any form or by any means, electronic, photocopied, recorded or otherwise, to parties outside DATACENTERTECHNOLOGIES N.V. without the prior written permission of DATACENTERTECHNOLOGIES N.V. TRADEMARKS DATACENTERTECHNOLOGIES and the DATACENTERTECHNOLOGIES logo are trademarks of Datacentertechnologies N.V. in Belgium and other countries. Other products mentioned in this document are trademarks or registered trademarks of their respective owners. Product Brief DC-Protect 2

3 Table of Contents 1 Introduction DC-Protect overview DC-Protect Features Architecture Content-based Backup Unlimited scalability Data transfer and storage reduction Long retention time Fast restores Data protection and encryption Flexible storage configuration Roll backward and forward Bare-metal disaster recovery Broad OS support Special file support Web-based installation and administration Ease of installation Conclusion About DATACENTERTECHNOLOGIES Product Brief DC-Protect 3

4 1 Introduction Professionals are generating more information than ever. Berkely University has calculated that in the coming three years, more information will be generated than in the past thirty centuries. In 2001 alone, 6 EB (ExaByte: 10E15) of information has been produced worldwide. Clearly, information is fuel to the worldwide economy. The Internet has been accepted as the primary network for business communication. Hence information is generated and shared using distributed networked computer and server systems rather than centralized mainframe computers. This distributed nature of networked computing poses a great challenge for system administrators. Rather than having to maintain and backup a small number of large systems, they now have to take care of a large number of diverse servers. Developing a disaster recovery plan in particular that guaranties quick recovery from the failure of one or all of these systems requires new tools that address this new way of computing. DATACENTERTECHNOLOGIES has developed a full set of technologies that addresses the specific nature of distributed computer farms. These technologies assist system administrators to easily and reliably install, backup, control, maintain and recover distributed servers and clients from remote locations. This product brief addresses the DATACENTERTECHNOLOGIES content based backup technology as it is available in the DC- Protect product. Product Brief DC-Protect 4

5 2 DC-Protect overview DC-Protect is a disk based backup, restore and recovery solution. While using disk as backup medium, DC-Protect offers the highest backup and restore speeds possible in a networked environment. As all backed up data is available on-line at any time, immediate restore operations at the speed of the network can be performed whenever the need arises. For disaster protection, backup data can be sent to two individual disk storages, of which one would typically be offsite. The DC-Protect patent pending content-based backup technology offers a design that largely reduces backup storage and bandwidth needs by eliminating the transport and storage of identical files. Not only is this true for redundant files on a single system between backup runs, comparable to traditional incremental backup schemes, but DC-protect effectively eliminates redundant files across all systems under control of. DC-Protect has a distributed architecture in which every target system runs its own backup tasks. Hence, DC-Protect easily scales to large numbers of target machines. This design allows all target machines to start their backup tasks simultaneously without limitation. The architecture permits making a daily full backup of every server or client in the customer environment within the stringent limits of the backup window. Hence, administrators don t need to bother anymore about restoring a system from full backup and incremental backup runs. When the need arises, a single file or a total system can be recovered immediately to any backup state throughout the retention period. Aside data files, DC-Protect backs up system and registry files. This allows a bare-metal disaster recovery on a broken system. In combination with DC-Operate, this recovery can even be performed remotely, without the need for any physical intervention. All the DC-Protect functionality is managed through an easy to use web interface. This interface is accessible form any browser without the need for installing any additional software. The interface offers customer (view), operator (per target machine) and system administrator management levels that are password protected. DC-Protect software is available pre-installed on a dedicated appliance what makes the installation as easy as racking the device and giving it an IP address through the front panel LCD display. These DC-Protect appliances are available in standalone and redundant configuration. Product Brief DC-Protect 5

6 3 DC-Protect Features 3.1 Architecture DC-Protect has a 3 layer architecture. 1. On the target machines, an intelligent DC-Protect agent performs the content based backup algorithm. 2. Centrally, the DC-Protect server controls the simultaneous backup and restore processes and manages the central storage database. 3. The actual backup data is stored on networked storage (NAS or SAN). Through this architecture there is no limitation to the backup scheduling. DC-Protect allows all backup tasks to start at the same time and run simultaneously. This guarantees that all systems will be backed up within the restrictions of the backup window. Backup disk Storage DC-Protect Server Target systems with DC-Protect Agent 3.2 Content-based Backup DC-Protect is based on patent pending content based backup technology what largely reduces backup storage and bandwidth needs. DC-Protect backs up files based on the uniqueness of their content. This means that files with identical content are backed up only once. Even if files with the same content exist on multiple servers (which is for instance the case with Product Brief DC-Protect 6

7 operating system and application related files) they are only backed up once thus rationalizing the backup process. The content based backup algorithm is performed by the DC- Protect agent on the target machines. Through this algorithm, for every file on the target system a 128 bit hashing key of the file content is being calculated. The central DC-Protect server manages a database with all the content ID s of all the files on the backup storage. Only when a file is not present in the central storage, it will be transferred over the network and stored in the storage. Content based backup will only transfer and store new or changed files since the last backup run, even when a full backup is performed every day. Content based backup also guarantees that multiple copies of identical files across all the backed up systems will only be sent over the network and stored once. DC-Protect dramatically reduces storage requirements and bandwidth usage by up to 99 %. 3.3 Unlimited scalability The DC-Protect agent performs the content based backup algorithm locally on the target machine. Through this distributed architecture, the DC-Protect backup solution can easily be expanded to keep pace with server farm growth. In server farms or data centers, a DC-Protect server will be installed per 50 target servers. This allows for a full backup on every system every day. 3.4 Data transfer and storage reduction DC-Protect compresses every file that is transmitted from the agent to the DC-Protect server. Typically compression rates form 2:1 to 5:1 are achieved depending on the file content. The files remain compressed when they are stored in the backup data store. In combination with the Content Based Backup algorithm, DC-Protect effectively minimizes transmission bandwidth and data storage. 3.5 Long retention time DC-Protect comes with a default retention time of 90 days. A full backup is performed every day relying on the content based backup algorithm to effectively reduce the backup storage requirements. The retention time is adjustable by the system administrator per backup task to meet the specific user needs. 3.6 Fast restores Restores of individual files or total systems can be promptly performed whenever the need arises. DC-Protect doesn t perform incremental or differential backups. Hence files do Product Brief DC-Protect 7

8 not need to be reassembled throughout the restore process. While the backup files are stored on networked storage the shortest restore times possible are guarantied. 3.7 Data protection and encryption For transferring files form the agent to the backup server, the data needs to be encrypted to guarantee data privately and security. This is certainly true when the data travels outside of the datacenter network or even over the public Internet in the event of a remote backup. At the backup server side, the data needs to be stored in an encrypted format to avoid malicious use by other users or even outside hackers. DC-Protect encrypt the files based on a 128 bit content related key. This guaranties the compatibility with the content based backup technology. Restore sets, which contain the necessary information to perform a restore operation are themselves encrypted using a user defined Pass Phrase. Thus only the user that has backed up a file can restore this file. A user or an eventual hacker can never access files that have been backed up by other users (customers) even though they reside on the same backup storage. 3.8 Flexible storage configuration DC-Protect is using a 128 bit content key for unique file identification and indexing. DC-Protect will store the files on the storage sorted and organized based on these content keys. When the storage consists of multiple disk volumes of non-equal sizes, then DC-Protect will evenly distribute the files over these volumes relative to their sizes. Consequently, CD-protect offers a lot of flexibility in backup storage organization. This content based indexing mechanism offers optimal performance for finding and retrieving the files during a restore operation, even when millions of files have been backed up over time. 3.9 Roll backward and forward In addition to data files, DC-Protect backs up system files and registries (in MS windows based systems) as well. This allows users to roll back a system to a previous state of a backup runs. Roll forward after a rollback operation is feasible as well Bare-metal disaster recovery DC-Protect allows a bare metal recovery of a failed machine based on any of its full backup runs. With a boot disk, created on any other machine, the DC-Protect recovery agent Product Brief DC-Protect 8

9 is launched on the failed machine or on replacement hardware. The recovery agent automatically partitions and formats the system hard disk and restores the system to its chosen pre-failure state. In combination with DC-Operate (another DATACENTERTECHNOLOGIES product) this operation can be performed fully remotely, eliminating the need for the boot disk Broad OS support DC-Protect agents for servers using the following operating systems are available: MS Win 2000 Server / Adv. Server / Datacenter MS Win NT4 Server Linux Sun Solaris BSD DC-Protect agents for clients (desktops, portables) using the following operating systems are available: MS Win 98 SE MS Win ME MS Win NT4 Workstation MS Win 2000 Home / Pro MS Win XP Home / Pro Linux 3.12 Special file support DC-Protect is a file based backup system. Besides regular files, it supports the backup of the following special files: File attributes, file times, security information, link information Open Files (using optional helper module) Directories Hard Links Sparse Files Registry (MS Windows) Streams (MS Windows) Both Unicode and 8.3 representation (MS Windows) Device Files (block and character devices) (Linux, Unix) Unix Sockets (Linux, Unix) Named Pipes (Linux, Unix) Product Brief DC-Protect 9

10 3.13 Web-based installation and administration System administrators can install, configure, and administer both DC-Protect and the storage repository from a central location over a web-based interface. They can even deploy DC-Protect to serve the backup needs of remote locations from a central location. Through multiple access levels to the interface, it can be deployed as self-service interface for backup service endusers as well as operational interface for operational and support staff Ease of installation DC-Protect is delivered preinstalled on a dedicated appliance. This makes it very easy to install the system and avoids hardware dependencies. Clients are installed by downloading them through the network by using the browser based user interface. As this user interface is browser based, it is accessible for client installation; even before the client software has been installed. This makes it very straightforward to plan the client rollout. Installed clients can be automatically updated from the central DC-Protect server without the need for client side intervention. 4 Conclusion DC-Protect is the next generation backup system that addresses the specific needs of distributed computing environments. It offers a flexible and scalable backup architecture that guarantees fast and reliable restore and recover operations. Its content based backup technology allows for daily full backup runs to disk based storage, overcoming the shortcomings of other backup media. Being preinstalled on an appliance and having a straight forward web interface, DC-Protect is a remarkably easy-to-use and intuitive backup solution. Product Brief DC-Protect 10

11 5 About DATACENTERTECHNOLOGIES DATACENTERTECHNOLOGIES develops and supports solutions for operating and managing data centers and corporate server parks. Our enormous expertise while working at hosting companies such as PSINet allows us to create a customized Data Center Operating System. We help companies plan and implement automated procedures and infrastructures for operations support in data centers thereby enhancing manageability, cost-effectiveness and scalability even when the data center scales to thousands of servers. Our services include: 1. Business Continuity Support Backup & restore and disaster recovery operations 2. Performance and Availability Support Performance, system and service monitoring, system installation. 3. Infrastructure and Operations Support Operational management, ranging from asset management all the way up to automated provisioning, capacity planning and support operations. Operations and IT managers benefit from complete, integrated control of the infrastructure either locally or remotely. They can also integrate our solutions with 3rd party solutions in order to maximize the return on their investment. Innovative product development led us to create a dedicated backup and restore solution DC-Protect- which we are reselling internationally through a network of channel partners. The company is a team of 30 professionals and has offices in Lochristi (B), Haarlem (NL) and Paris (F). DATACENTER TECHNOLOGIES benefits from strong backing by international investors having raised EUR 14.5 m. in two financing rounds. Product Brief DC-Protect 11

FAQ. Hosted Data Disaster Protection

FAQ. Hosted Data Disaster Protection Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional

More information

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform

More information

EMC Retrospect 7.5 for Windows. Backup and Recovery Software

EMC Retrospect 7.5 for Windows. Backup and Recovery Software EMC Retrospect 7.5 for Windows Backup and Recovery Software Data Protection for Small and Medium Business EMC Retrospect backup and recovery software delivers automated, reliable data protection for small

More information

EMC Retrospect 7.5 for Windows. Backup and Recovery Software

EMC Retrospect 7.5 for Windows. Backup and Recovery Software EMC Retrospect 7.5 for Windows Backup and Recovery Software Data Protection for Small and Medium Business EMC Retrospect backup and recovery software delivers automated, reliable data protection for small

More information

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business

More information

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.

More information

How To Protect Your Data With Ecm Retrospect

How To Protect Your Data With Ecm Retrospect EMC Retrospect 7.5 for Windows Backup and Recovery Software Data Protection for Small and Medium Business EMC Retrospect backup and recovery software delivers automated, reliable data protection for small

More information

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

More information

CrashPlan PRO Enterprise Backup

CrashPlan PRO Enterprise Backup CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for

More information

Introduction. Ease-of-Use

Introduction. Ease-of-Use Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

Secure Your Business with EVault Cloud-Connected Solutions

Secure Your Business with EVault Cloud-Connected Solutions Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault

More information

WHITE PAPER. Storage Savings Analysis: Storage Savings with Deduplication and Acronis Backup & Recovery 10

WHITE PAPER. Storage Savings Analysis: Storage Savings with Deduplication and Acronis Backup & Recovery 10 Storage Savings Analysis: Storage Savings with Deduplication and Acronis Backup & Recovery 10 Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 The Importance of Deduplication...

More information

techsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01

techsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01 techsafe Features Page 1/9 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 5 Security File Compression Encryption Transmission

More information

VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights

VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide

More information

Data Protection Simple. Compliant. Secure. CONTACT US Call: 020 3397 9026 Email: Support@jms-securedata.co.uk Visit: www.jms-securedata.co.

Data Protection Simple. Compliant. Secure. CONTACT US Call: 020 3397 9026 Email: Support@jms-securedata.co.uk Visit: www.jms-securedata.co. Data Protection Simple. Compliant. Secure CONTACT US Call: 020 3397 9026 Email: Support@jms-securedata.co.uk Visit: www.jms-securedata.co.uk COMPLEX CHALLENGES SIMPLE SOLUTIONS Backups Tricky but necessary

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

VERITAS NetBackup BusinesServer

VERITAS NetBackup BusinesServer VERITAS NetBackup BusinesServer A Scalable Backup Solution for UNIX or Heterogeneous Workgroups V E R I T A S W H I T E P A P E R Table of Contents Overview...................................................................................1

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec

More information

BDR TM V3.0 DEPLOYMENT AND FEATURES

BDR TM V3.0 DEPLOYMENT AND FEATURES BDR TM V3.0 DEPLOYMENT AND FEATURES VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results of

More information

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

How To Backup Your Hard Drive With Pros 4 Technology Online Backup Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

WHITE PAPER. Altiris Recovery Products for DELL Customers. Produced By Product Management Altiris. August 6, 2003.

WHITE PAPER. Altiris Recovery Products for DELL Customers. Produced By Product Management Altiris. August 6, 2003. Altiris Recovery Products for DELL Customers Produced By Product Management Altiris August 6, 2003 By Todd Mitchell 2003 Altiris, Inc. All Rights Reserved Altiris Recovery Solution 5.7 Page 2 Notice The

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite. Attix5 Pro Overview V7.x An overview of the Attix5 Pro product suite. Copyright notice and proprietary information This document is published by Attix5 or its local affiliated company, without any warranty.

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

Sales Tool. Summary DXi Sales Messages November 2009 6 NOVEMBER 2009. ST00431-v06

Sales Tool. Summary DXi Sales Messages November 2009 6 NOVEMBER 2009. ST00431-v06 Summary DXi Sales Messages November 2009 6 NOVEMBER 2009 ST00431-v06 Notice This Sales Tool contains proprietary information protected by copyright. Information in this Sales Tool is subject to change

More information

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery. Protect Against Business Downtime and Disaster with Rapid, Reliable Backup and Recovery Overview Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small

More information

SVA Backup Plus Features

SVA Backup Plus Features 1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most

More information

Online Backup Solution Features

Online Backup Solution Features CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium

More information

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning 10 Things Your Data Center Backup Solution Should Do Reliable, fast and easy backup is only the beginning Table of Contents Ten Things Your Data Center Backup Should Do 1 #1: Reduce Hours Spent on Backup

More information

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery Windows Small Business Server Edition

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery Windows Small Business Server Edition Symantec Backup Exec System Recovery Windows Small Business Server Edition Overview Regardless of the size of your company, data drives your business. Your ability to keep that data available can often

More information

OVERVIEW. IQmedia Networks Technical Brief

OVERVIEW. IQmedia Networks Technical Brief IQmedia Networks Technical Brief From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data

More information

Competitive Analysis Retrospect And Our Competition

Competitive Analysis Retrospect And Our Competition Competitive Analysis And Our Competition September 2013 Competitive Analysis: for Windows and our top competitors We ve taken a hard look at our competition and how we stack up. Here is a comparison of

More information

Moving beyond tape backup.

Moving beyond tape backup. IBM Global Services January 2008 Moving beyond tape backup. Addressing the data protection challenges for midsize businesses Page 2 Contents 2 Introduction 2 Data protection challenges 2 Under resourced

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

IBM Tivoli Storage Manager

IBM Tivoli Storage Manager Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing

More information

Energy Efficient Storage - Multi- Tier Strategies For Retaining Data

Energy Efficient Storage - Multi- Tier Strategies For Retaining Data Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

WHITE PAPER. Acronis Backup & Recovery 10 Overview

WHITE PAPER. Acronis Backup & Recovery 10 Overview Acronis Backup & Recovery 10 Overview Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 The Next Generation Backup and Recovery Solution from Acronis... 4 New! Scaleable Architecture

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

CRASHPLANPRO case studies

CRASHPLANPRO case studies CRASHPLANPRO case studies contents enterprise backup: cloud enterprise backup: private cloud enterprise backup: global notes/comments 5 9 CASE STUDY *COMPANY PROFILE* Established in the early 980s, this

More information

Symantec Backup Exec 12 for Windows Servers

Symantec Backup Exec 12 for Windows Servers The gold standard in Windows data protection Overview Symantec Backup Exec 12 delivers efficient, easy-tomanage backup and recovery protection from server to desktop, providing optimized data protection

More information

Online backup subscription service and security overview

Online backup subscription service and security overview Online backup subscription service and security overview Abstract This White Paper is a ready reckoner for Small and Medium Enterprises (SMEs) for their data storage needs. Traditional tape-based backups

More information

Implementing and Supporting Microsoft Windows XP Professional

Implementing and Supporting Microsoft Windows XP Professional Implementing and Supporting Microsoft Windows XP Professional Key Data Course #: 2272C Number of Days: 5 Format: Instructor-led The purpose of this course is to address the implementation and desktop support

More information

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery The Gold Standard in Complete Windows System Recovery Overview Symantec Backup Exec System Recovery 8.5 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops,

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

Total Data Protection for your business

Total Data Protection for your business A platform to empower your business C Y K C K C K Total Data Protection for your business Protecting business data No matter where it lives At Breakwater we understand the importance of a dependable, extremely

More information

Dell PowerVault DL Backup to Disk Appliance Powered by CommVault. Centralized data management for remote and branch office (Robo) environments

Dell PowerVault DL Backup to Disk Appliance Powered by CommVault. Centralized data management for remote and branch office (Robo) environments Dell PowerVault DL Backup to Disk Appliance Powered by CommVault Centralized data management for remote and branch office (Robo) environments Contents Executive summary Return on investment of centralizing

More information

Paragon Protect & Restore

Paragon Protect & Restore Paragon Protect & Restore ver. 3 Centralized and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores Paragon

More information

Symantec Backup Exec System Recovery

Symantec Backup Exec System Recovery Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery Overview 7.0 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops,

More information

CA ARCserve Backup Agents and Options

CA ARCserve Backup Agents and Options PRODUCT SUMMARY: CA ARCSERVE BACKUP R12.5 AGENTS AND OPTIONS CA ARCserve Backup r12.5 Agents and Options خدةش شدزذ ءشءء خءحزدءز ذ باةب سسءج -ءجزدط سز ءءد ١٢.٥ ز ذصث ء ظ ضز س زء ء زصدس ز اءزدشس جصءز طدذ

More information

EMC BACKUP-AS-A-SERVICE

EMC BACKUP-AS-A-SERVICE Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase

More information

Acronis Backup Product Line

Acronis Backup Product Line New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures 1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

Understanding EMC Avamar with EMC Data Protection Advisor

Understanding EMC Avamar with EMC Data Protection Advisor Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection

More information

Virtualization 101: Technologies, Benefits, and Challenges. A White Paper by Andi Mann, EMA Senior Analyst August 2006

Virtualization 101: Technologies, Benefits, and Challenges. A White Paper by Andi Mann, EMA Senior Analyst August 2006 Virtualization 101: Technologies, Benefits, and Challenges A White Paper by Andi Mann, EMA Senior Analyst August 2006 Table of Contents Introduction...1 What is Virtualization?...1 The Different Types

More information

WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server

WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION SYMANTEC Backup Exec 10d Continuous Protection Server 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 Current Situation...3 The New Opportunity...3 The

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

The Trouble with Backups

The Trouble with Backups The Trouble with Backups Backups are central to any data protection strategy, but by some estimates more than half of all backups fail either in whole or in part. When you look at the reasons for why they

More information

StorageCraft Technology Corporation Leading the Way to Safer Computing 2009 StorageCraft Technology Corporation. All Rights Reserved.

StorageCraft Technology Corporation Leading the Way to Safer Computing 2009 StorageCraft Technology Corporation. All Rights Reserved. PRODUCT WHITEPAPER This brochure is for informational purposes only. STORAGECRAFT MAKES NO WARRANTIES, EXPRESSED OR IMPLIED, IN THIS SUMMARY. StorageCraft, ShadowProtect and ExactState and the StorageCraft

More information

Solution Overview. Business Continuity with ReadyNAS

Solution Overview. Business Continuity with ReadyNAS Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage

More information

FUJITSU Backup as a Service Rapid Recovery Appliance

FUJITSU Backup as a Service Rapid Recovery Appliance FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organization is rapidly increasing in importance. It guides and supports

More information

Protecting. All the Time

Protecting. All the Time Protec Protecting Protecting Protecting All your Data, All the Time Acronis Backup & Recovery 11 Reliable Data What Would You Do without It? Your data is more than a bunch of ones and zeros. It s the heart

More information

Online Backup Plus Frequently Asked Questions

Online Backup Plus Frequently Asked Questions Online Backup Plus Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which

More information

HELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES

HELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES HELPDESK & SERVER MONITORING Organisations are under pressure to implement efficient, reliable and cost effective helpdesk And server monitoring service solutions. Our Helpdesk & Server Monitoring services

More information

DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES

DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES DISK IMAGE BACKUP For Physical Servers VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

The EVault Portfolio

The EVault Portfolio The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise

More information

The syslog-ng Store Box 3 LTS

The syslog-ng Store Box 3 LTS The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

SteelFusion with AWS Hybrid Cloud Storage

SteelFusion with AWS Hybrid Cloud Storage Solution Guide SteelFusion with AWS Hybrid Cloud Storage March 2016 The Challenge According to IDC, to meet the demands of global customer and global talent requirements, companies have to maintain remote

More information

VERITAS NetBackup Professional 3.5

VERITAS NetBackup Professional 3.5 VERITAS NetBackup Professional 3.5 Centralized Backup and Simplified Recovery for Distributed Client Data V E R I T A S W H I T E P A P E R Table of Contents Executive Summary.............................................................................................

More information

Reducing Backups with Data Deduplication

Reducing Backups with Data Deduplication The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...

More information

Database Backup and Recovery Guide

Database Backup and Recovery Guide Scout Diagnostics Database Backup and Recovery Guide P H 803. 358. 3600 F A X 803. 358. 3636 WWW.AVTECINC.COM 100 I N N O VAT I O N P L ACE, L E X I N G T O N SC 29072 Copyright 2013 by Avtec, Inc. All

More information

Windows Server Virtualization An Overview

Windows Server Virtualization An Overview Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.

More information

Best Practices for Deploying and Managing Linux with Red Hat Network

Best Practices for Deploying and Managing Linux with Red Hat Network Best Practices for Deploying and Managing Linux with Red Hat Network Abstract This technical whitepaper provides a best practices overview for companies deploying and managing their open source environment

More information

Corporate Enterprise Data Protection Package

Corporate Enterprise Data Protection Package Corporate Enterprise Data Protection Package Enterprise-Level Disaster Recovery Remote and Branch-Office Protection Employee Laptops and Remote Devices Who We are Since 2003, KeepItSafe has provided large-enterprise

More information

Total Backup Recovery

Total Backup Recovery Total Backup Recovery Ultimate Backup & Recovery Solution for Businesses & Organizations Total Backup Recovery 7 Series is a total backup and recovery solution for businesses and organizations. The series

More information

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this

More information

Backup and Recovery: The Benefits of Multiple Deduplication Policies

Backup and Recovery: The Benefits of Multiple Deduplication Policies Backup and Recovery: The Benefits of Multiple Deduplication Policies NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change

More information

NetApp Syncsort Integrated Backup

NetApp Syncsort Integrated Backup WHITE PAPER NetApp Syncsort Integrated Backup Protect your Microsoft and VMware Environment with NetApp Syncsort Integrated Backup Protecting Microsoft and VMware Executive Summary 3 Microsoft and VMware

More information

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification

More information

DATA BACKUP & RESTORE

DATA BACKUP & RESTORE DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is

More information

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,

More information

Release Notes. Cloud Attached Storage 2.5.32

Release Notes. Cloud Attached Storage 2.5.32 Release Notes Cloud Attached Storage 2.5.32 January 2011 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information