The Evolution of Backup
|
|
|
- Berniece Grant
- 10 years ago
- Views:
Transcription
1 Solution Brief Once, in some long-forgotten era, data storage was simple. Or, simply put, there was only one way to protect data: magnetic tape. More than half a century ago, when backup technology was in its infancy, tape offered the singular method for making copies of electronic information. Dating back to the 1950s, you d expect tape to have long gone the way of drive-ins and sock hops. After all, in that era, a terabyte of data wasn t even a glint in a computer geek s eye. It even predated the term, computer geek. Despite expectations, when it comes to data protection, the more things change, the more they stay the same. Technology news sources continue to cite the use of tape by more than 70% of businesses as part of their overall backup strategy. 1 It takes a bit of digging to unearth the reasons why, and moreover, to understand where data protection is headed these days. 1
2 2 Unitrends offers a solid solution to server protection that requires less administration, but all of the features of much more expensive products. David Kennedy Financial Asset Management Systems We pointed it to the cluster IP, and it found the VMs. I chose the ones to backup, set the backup preferences and away we went. Erik Sheldon KSBJ and NGEN Radio The Dawn of Data Protection The basic strategy for preserving data started out as a simple, two-fold intention: 1. Create a backup, or provide a way to copy information from the source where it resides for normal operations, to a backup target, where it remains for either a defined or an indefinite period. 2. Enable recovery, or provide a means to restore backed up information to an easily accessed destination. For businesses, this basic strategy serves two distinct purposes. First, it seeks to preserve copies of data for restoration in the event of loss. It also provide a means for storing older data according to an organization s data retention policy. This older data generally resides beyond immediate access. Over time and particularly over the last two decades changes in both the technologies protected and those technologies providing protection have complicated data storage. Factors influencing backup and recovery include: Storage Destinations. Where data gets stored both historically and currently includes tape, disk, optical, and online/remote. Storage Methods. These range from unstructured storage to system imaging, and include incremental, differential, and continuous backup technologies. Optimization Technologies. These include compression, deduplication, duplication, and encryption. Divergent Strategies Hardware, software, and cloud offer varied answers, but also more questions about how best to protect enterprise data. Support for Virtualization. Technologies such as VMware and Hyper-V provide a software platform that executes programs as if it were a physical machine, stretching resource dollars, but also complicating data protection strategies. RPO and RTO. Backup and recovery planning typically addresses two distinct measurements that help to define data recovery: RPO and RTO, or recovery point objective and recovery time objective.
3 3 The backups are done in real-time without affecting the availability or performance of the credit union s online banking services. Jackie Miller 360 Federal Credit Union Storage Destinations From the dawn of the data storage era, the storage type defined the approach, making it a good place to begin digging to unearth some facts about backup and recovery, then-to-now. In the event of a major incident at our Toronto facility we can use the data from the remote appliance to quickly rebuild servers, or even power up server images directly on the appliance to get everything back online within hours. Baltazar Palha CSA Transportation Magnetic Tape. In the 70s, about twenty years into its use, magnetic tape as a backup solution proved costly, and had evolved into somewhat of a management nuisance. As it became more cost effective in the 80s, though, tape was once again regarded as suitable for keeping pace with data storage needs. At the time, it seemed satisfactory as a sequential access medium, writing data quickly enough. A few years later, however, tape again lost ground in terms of streaming, tending to start and stop because it couldn t keep up with data rates as these increased. Adding another tape drive caused alignment problems when using one tape drive to write data and another to read it. And, as an overriding downside, decade after decade: there is no easy way to locate particular sets of data when it comes to restoring from tape. Maintaining backup tapes as data multiplies requires rotating them and moving them off-site to ensure preservation, complicating the strategy. Regardless of its many challenges, though, tape remains a part of at least 50% or more of all businesses backup strategies, with a wave of new tape formats between further entrenching this outdated solution to data protection in the business world. Hard Disk. Also described as D2D (disk-to-disk), this backup option first appeared in the 70s, providing superior reliability compared to tape. With improved access, availability, and capacity, hard disks provided advantages tape backup couldn t deliver. It also enabled high-performance connectivity
4 4 Even as our Sheriff s office continues to store an increasing amount of large image data, I know our Unitrends solution has the capacity and reliability to handle it all. Suzanne Horton Tioga County Backup systems need to simply work and be simple to manage. Michael Sodolak KBA North America over varied distances through SCSI, USB, FireWire, esata, Ethernet, iscsi, and Fibre Channel. The downside: Despite savings on operational expenses and an increase in reliability, the price per gigabyte for disk drives dilutes their viability for businesses with growing data stores. With costs to purchase and support software to manage those backups, D2D replaced the set of challenges posed by tape backup with other, equally frustrating challenges of its own. Optical and RAID. The next backup technology wave brought with it CDs and DVDs, replacing tape with a slightly more reliable, inexpensive yet portable medium. RAID archival also emerged, further increasing reliability while improving on standard hard disk technology with network-attached storage (NAS) for file-level, and storage-area networks (SAN) for block-level network storage to dedicated devices. Online (Cloud). While on-site backups allow for immediate access and retrieval of lost data, off-site backups provide the best protection from disasters such as fire, flood, or earthquake. As businesses began to understand the necessity of combining both worlds, improved broadband internet access ushered in the advent of remote backup services. Still, transmitting large amounts of data over the Internet results in much slower backup rates than backing up the same amount of data to local storage. Even an expensive, fully-provisioned, telephony-grade, symmetric 1.5Mbps WAN connection to a backup store would require from days to upload or download a single terabyte of data, unacceptable for any business that doesn t favor the thought of extinction. Combining cloud-based backup and on-premise backup offers the best of local backup and recovery strategy. Holding down the cost of this mix, however, can pose a major barrier to adoption. Storage Methods Aside from storage type, it makes sense to take a look at the means that have evolved and added complexity to data storage. Unstructured. At a basic level, tapes and optical storage (CDs, DVDs) fall within this category of storage technologies. Unstructured media requires labeling and physical safekeeping, and affords the most rudimentary means for managing data storage. System Imaging. System images record complete snapshots of a server configuration at a given point in time. The practice of system imaging arose as a way to deploy a standard configuration to other systems, and has since evolved into a means for creating ongoing backups of those systems. Both SAN (block-level) and NAS (file-level) technologies helped to pave the way for improved backup management through snapshots, though these don t provide the best method for absolute preservation of data. They can, however, improve RPOs (Recovery Point Objectives) and RTOs (Recovery Time Objectives) and, coupled with disk-to-disk (D2D), offer a better approach in terms of physical failure and data retention. D2D and thus DAS (Direct
5 5 We did a bare metal recovery to that server. We ve done that at least twice in the span of a couple of weeks. And, it was fun, easy and fast. Rod Smith Griffin-Spalding County School System Unitrends potentially saved us many hours of manpower and capital, or rather it will if/when that VM crashes. Eric Hagen Selectron Technologies Attached Storage) can also offer a cheaper storage solution than dedicating expensive SAN capacity to snapshots. Differential. A differential backup saves all data since the last full backup. As data changes and typically increases, so does the time to perform the backup, known as the backup window. Differential backup includes a full backup and, thereafter, complete backups of all the changes since the last full backup. Restoring an entire system to a certain point in time using differential backup requires the last full backup prior to loss/failure plus the latest differential backup since that last full backup. Incremental. An incremental backup improves on the differential backup scenario, storing only increments of change between two points in time and eliminating duplicate stores of unchanged data that result from repeated full backups. Incremental backups include a full backup and, thereafter, any number of incremental backups created from changed data only. Restore would then include the most recent full backup prior to data loss, plus each incremental backup from the full backup up to the point in time of loss/ failure. Optimization Technologies As data stores have grown and technologies have changed, so storage complexity has increased. Subsequently, diverse technologies have emerged to enable the best possible result in backup and recovery. Each of these technologies enhances some aspect of data protection; combining them all can be tricky, but beneficial, if done correctly. Replication. The logical synchronization used to achieve backup can occur in one of two ways. Array-based replication requires purchase of more and more physical storage as your data stores grow. Host-based replication uses software residing on the source computer, copying data from that source to a target computer. This operation places an extreme load on the source computer, however, and requires significant bandwidth that results in network latency. Compression. The use of any of various compresson schemes allows a reduction in the size of the source data so that it uses less storage space. Compression is frequently a built-in feature of tape drive hardware. Deduplication. Backup of similar systems to the same destination storage device creates the potential for many duplicate data sets. For instance, a group of Windows workstations may contain the same system information and client-side applications. Since the data repository needs only one copy of these applications and system files for recovery, it makes sense to perform deduplication. File- and block-level deduplication help save backup space by storing only unique data. Deduplication on the source server, before moving data called source/client side deduplication reduces backup bandwidth. Deduplication once data has moved to the target storage is called inline or back-end deduplication. Byte-level deduplication combines the resource efficiency of file-level deduplication with the data reduction effectiveness of block-level
6 6 During our busy season we cannot afford any downtime. This solution keeps our business running, no matter what happens. Luke Simpson Ward & Uptigrove deduplication. Content aware, or byte-level deduplication uses content recognition to optimize data reduction with fewer resources. Duplication. Sometimes backups are duplicated to a second set of storage media. This allows rearrangement of those backup images to optimize restore speed or to store a second copy at a different location or on a different storage medium. Encryption. Encryption uses pattern recognition to safeguard data from unauthorized access during network transit, or if a system (such as a laptop) is stolen. On the downside, encrypted data can slow down backup speeds, and it works counter to deduplication and compression, both of which seek to trim the amount of information you back up by reducing patterns in that data. RPO and RTO One other optimization technique, mentioned earlier, deserves a bit more attention: recovery point objective (RPO) and recovery time objective (RTO). RPO is a measure of data loss tolerance, translating to work you will need to recreate in the event of loss. RTO is the time lapse acceptable before employees begin working again after a disruption. Backup Restore Recovery Point Objective Recovery Time Objective Weeks Days Hours Minutes Minutes Hours Days Weeks Seconds Productivity Loss = RPO + RTO Cost = Productivity Loss x Total Hourly Rate of Effected Employees When loss occurs, data is not the only consideration; you first need to recover the systems you use to contain data. The best way to do this is through a recovery technique called bare metal recovery. A bare metal restore rebuilds a system quickly, recovering to designated hardware not only files, but operating systems, applications, data components and settings. Even better, dissimilar bare metal recovery lets you restore across varied systems, from physical-to-physical (P2P), virtual-to-physical (V2P), and physical-to-virtual (P2V). With bare metal recovery, you restore not only files, but operating systems, applications, data components and settings to a separate piece of hardware. Next, you want to align your RPO with your desired retention, making sure your data protection solution supports diverse technologies previously mentioned, such as system imaging and replication. This will allow you full protection against both logical and physical failure by duplicating the right sets of data from your primary storage device. And RPO can vary, depending on types of data. Databases and require faster RPO than file systems, while the different systems containing that data may have different RPOs, too.
7 7 Finally, you ll want to balance RPO and RTO for all your technology assets, including notebooks, workstations, and PCs, all of which contain valuable data that equate with time and money. Support for Virtualization Over the last decade, server virtualization has spread across technology environments as a way to stretch resources. Virtualization partitions physical servers into individual, simulated servers that share the same physical resources. Though virtualization adds more bang for the buck, it also produces yet another layer of complexity to the evolving technology landscape, particularly when it comes to data protection. And, for those businesses who still use tapes for data protection, virtual machines (VMs) cannot back up to tape. In the case of agent-based backup, an agent you install in a VM streams its data to the backup target. Agentless backup software communicates with associated VM APIs to prepare data for backup. These APIs snap the volume and send that snapshot to the backup target. Depending on platform, VM environments can include varied hypervisors, and further, require monitoring and maintenance. Most businesses won t adopt a 100% virtualization strategy; more likely, they will continue to mix both traditional with varied virtual implementations. In that case, a heterogeneous, bare metal recovery solution offers the best means for data restoration, whatever your VMs, agent-based or agentless. Divergent Strategies In all, there are three distinct means for managing data storage. These are: hardware-based, software-based, or cloud. Each provides specific advantages and disadvantages of its own. Hardware-centered backup can offer built-in optimization features, but can also be costly, based on price of storage medium. Software might be cheap, but it s no quick fix. You ll likely find yourself investing in a dedicated server, OS, storage controller, and lots of backup space. You may even need to upgrade your network to handle the added traffic generated by some solutions. Cloud solutions provide the low cost of pooled resources, but their interminable recovery rates leave you unprepared for common data loss occurences such as deleted files or system failures. The ideal solution would combine the best of all three worlds...
8 8 Fully Adapted All the complexity of today s heterogeneous technology environment calls for one thing: A holistic approach. So let s take one step further into today s data protection era. What would that step look like? Three words: Heterogeneity. Scalability. Flexibility. Here s how Unitrends delivers all three: We blend core optimization features into our appliances, featuring adaptive, byte-level deduplication and AES-256 encryption. We scale our solutions simply, with a No Limits Licensing scheme that does away with the idea of peranything fees. We offer world-class RPO to the tune of backups every 60 seconds, and near-continuous data protection, with 10,000 snapshots a week. We provide single-tenant and multi-tenant replication for both private cloud and our public cloud Vault2Cloud service. We wrap it all up with standard, proactive support that includes phone, , and online chat, certified by our 98%+ customer satisfaction rating. Let Unitrends help you evolve your backup and recovery strategy. About Unitrends Unitrends delivers award-winning business recovery solutions for any IT environment. The company s portfolio of virtual, physical and cloud solutions provides adaptive protection for organizations globally. To address the complexities facing today s modern data center, Unitrends delivers end-to-end protection and instant recovery of all virtual and physical assets as well as automated disaster recovery testing built for virtualization. With the industry s lowest total cost of ownership, Unitrends offerings are backed by a customer support team that consistently achieves a 98 percent satisfaction rating. Visit. Ready to see Unitrends in action? Watch us crash a server and restore it: /product-demo
Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments
Solution Brief Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Summary Your business infrastructure relies on your Microsoft SQL Servers. Your business no matter the size
Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection
Solution Brief Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection 2 Unitrends has leveraged over 20 years of experience in understanding ever-changing data protection challenges in
AppAssure. -vs- Unitrends COMPETITIVE ANALYSIS. Backup Exec 3600 vs Unitrends A GLANCE INSIDE:
Backup Exec 3600 vs Unitrends AppAssure -vs- Unitrends A GLANCE INSIDE: Company Overviews Competitive Analysis Product and Licensing Support Recovery and Restore Monitoring and Management Backup Technology
Protecting Windows Microsoft Exchange Server Data Protection
Solution Brief Protecting Microsoft Exchange Server Growth in data for Microsoft Exchange is expanding at a rapid growth rate. Mailbox sizes are increasing due to multimedia file, documentation collaboration
Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices
Solution Brief Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices 2 So you re confident knowing that the backup and recovery solution protecting your business-critical operations
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
Simplifying Server Workload Migrations
Simplifying Server Workload Migrations This document describes the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual
Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its
DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business
Virtual Server System and Data Protection, Recovery and Availability
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Virtual Server System and Data Protection, Recovery and Availability Although server virtualization helps reduce IT infrastructure costs, it also
SOLUTION BRIEF: CA ARCserve R16. Leveraging the Cloud for Business Continuity and Disaster Recovery
Leveraging the Cloud for Business Continuity and Disaster Recovery There are many reasons why businesses today find high value in a cloud service, whether it s a private cloud offered by a Managed Services
Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
Complete Storage and Data Protection Architecture for VMware vsphere
Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.
5 Essential Benefits of Hybrid Cloud Backup
5 Essential Benefits of Hybrid Cloud Backup QBR is a backup, disaster recovery (BDR), and business continuity solution targeted to the small to medium business (SMB) market. QBR solutions are designed
Pricing & Licensing Guide
Pricing & Licensing Guide arcserve Unified Data v5 Welcome to the Pricing & Licensing Overview for arcserve Unified Data. in this guide, you will find a high level product overview, understand the product
SOLUTION BRIEF: CA ARCserve R16. Virtual Server System and Data Protection, Recovery and Availability
Virtual Server System and Data Protection, Recovery and Availability Page 2 Although server virtualization helps reduce IT infrastructure costs, it also adds complexity to protecting the wide range of
Virtual Server System and Data Protection, Recovery and Availability
Virtual Server System and Data Protection, Recovery and Availability Although server virtualization helps reduce IT infrastructure costs, it also adds complexity to protecting the wide range of applications
Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com
Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com Introduction Manufacturers need to keep their businesses up and running more than ever now. Automating work processes
Solution brief: Modernized data protection with Veeam and HP Storage
Solution brief: Modernized data protection with Veeam and HP Storage Modern Data Protection Built for Virtualization November, 2013 Contents Executive summary....3 Key points...3 Virtual machine data protection
(Formerly Double-Take Backup)
(Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)
CA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales [email protected] The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
REMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
Comparing Online Enterprise Backup Systems. A reliable online backup system is essential for any business running workstations and
Lakin 1 Ronald Lakin CIS 130 Hardware Nick Romano September 28 2015 Comparing Online Enterprise Backup Systems A reliable online backup system is essential for any business running workstations and servers.
Five Fundamentals for Modern Data Center Availability
Five Fundamentals for Modern Data Center Availability David Davis VMware vexpert Kirsten Stoner Product Strategy Coordinator Contents Introduction...3 Use an availability solution built for modern data
Comparison: Abaxio s Nimbus Appliances vs. Veeam
Comparison: s Nimbus s vs. Primary Advantages of : focuses only on protecting the VMware virtual environment and offers supplementary tools and utilities to manage the virtual environment. Primary Disadvantages
Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com
Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Introduction Financial institutions need to keep their businesses up and running more than ever now. Considering
Sharepoint, SQL, And Exchange Backup In Virtual And Physical Environments
Whitepaper Sharepoint, SQL, And Exchange Backup In Virtual And Physical Environments CTO Series: Dr. Mark Campbell, Chief Strategy/Technology Officer, Unitrends 2 Introduction Enterprise Windows demands
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this is the lifeblood
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
SEP Software. About SEP. Key Features ONE BACKUP & DISASTER RECOVERY SOLUTION FOR THE ENTIRE ENTERPRISE
SEP Software ONE BACKUP & DISASTER RECOVERY SOLUTION FOR THE ENTIRE ENTERPRISE About SEP SEP is an enterprise backup and disaster recovery solution for today s discerning computer environments. Supporting
Protecting the Microsoft Data Center with NetBackup 7.6
Protecting the Microsoft Data Center with NetBackup 7.6 Amit Sinha NetBackup Product Management 1 Major Components of a Microsoft Data Center Software Hardware Servers Disk Tape Networking Server OS Applications
Meeting the Top Backup Challenges in Small and Medium Business Environments
Meeting the Top Backup Challenges in Small and Medium Business Environments December 2008 Although small and medium businesses (SMBs) do not typically generate the same amount of data that large enterprises
Protezione dei dati. Luca Bin. EMEA Sales Engineer [email protected]. Version 6.1 July 2015
Protezione dei dati Luca Bin EMEA Sales Engineer [email protected] Version 6.1 July 2015 Barracuda Backup Easy Cloud-Connected Backup Version 6.1 July 2015 Traditional Backup is Complicated Highly diverse
How To Back Up A Virtual Machine
2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud
ACCELERATING YOUR IT TRANSFORMATION WITH EMC NEXT-GENERATION UNIFIED STORAGE AND BACKUP
ACCELERATING YOUR IT TRANSFORMATION WITH EMC NEXT-GENERATION UNIFIED STORAGE AND BACKUP Virtualization, in particular VMware, has changed the way companies look at how they deploy not only their servers,
NETAPP SYNCSORT INTEGRATED BACKUP. Technical Overview. Peter Eicher Syncsort Product Management
NETAPP SYNCSORT INTEGRATED BACKUP Technical Overview Peter Eicher Syncsort Product Management Current State of Data Protection Production Data Protection Storage Physical & VM App Servers Backup Servers
Using Live Sync to Support Disaster Recovery
Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a
Library Recovery Center
Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery
Protecting Citrix XenServer Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Citrix XenServer Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
Backup and Archiving Explained. White Paper
Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are
How To Protect Your Data From Harm
Brochure: Comprehensive Agentless Backup and Recovery Software for the Enterprise Comprehensive Agentless Backup and Recovery Software for the Enterprise BROCHURE Your company s single most valuable asset
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper
Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices Business white paper Table of contents Data protection synonymous with business success...
Vodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
Archiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
Data Protection and Recovery
Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e., web hosting, email hosting, and database
CA arcserve r16.5 Hybrid data protection
CA arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
Protecting. All the Time
Protec Protecting Protecting Protecting All your Data, All the Time Acronis Backup & Recovery 11 Reliable Data What Would You Do without It? Your data is more than a bunch of ones and zeros. It s the heart
Real-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
Altaro Hyper-V Backup
Altaro Hyper-V Backup An Introduction [email protected] www.altaro.com An Introduction Contents What we'll be covering... Product Overview Installation Configuring and Managing your Backups Backing up VMs
Acronis Backup Product Line
New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote
Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert
ebook Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert Greg Shields MS MVP & VMware vexpert Greg Shields is a Senior Partner with Concentrated
DEDUPLICATION BASICS
DEDUPLICATION BASICS 4 DEDUPE BASICS 12 HOW DO DISASTER RECOVERY & ARCHIVING FIT IN? 6 WHAT IS DEDUPLICATION 14 DEDUPLICATION FOR EVERY BUDGET QUANTUM DXi4000 and vmpro 4000 8 METHODS OF DEDUPLICATION
One Solution for Real-Time Data protection, Disaster Recovery & Migration
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder
Stan Elesky Western Region Sales Manager. Integrated and Elegant Backup Solutions
Stan Elesky Western Region Sales Manager Integrated and Elegant Backup Solutions Data Protection Disaster Recovery Solutions Simplified Backup and Rapid Restoration Of Data, Operating Systems and Applications
Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY
INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration
Dell Data Protection Managed Service Provider Program
Dell Data Protection Managed Service Provider Program Grow your business in the data protection marketplace, a sector that Gartner estimates will see 40 percent of organizations augmenting or changing
10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning
10 Things Your Data Center Backup Solution Should Do Reliable, fast and easy backup is only the beginning Table of Contents Ten Things Your Data Center Backup Should Do 1 #1: Reduce Hours Spent on Backup
Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
HYBRID CLOUD BACKUP 101. Top Five Benefits of Cloud-Connected Appliances
HYBRID CLOUD BACKUP 101 Top Five Benefits of Cloud-Connected Appliances Hybrid cloud backup solutions will grow at a compounded average a growth rate of more than 80%. TANEJA GROUP 02 Introduction Most
Why Your Backup/Recovery Solution Probably Isn t Good Enough
Why Your Backup/Recovery Solution Probably Isn t Good Enough Whatever can go wrong, will go wrong. Whatever can go wrong, will go wrong. Are you prepared? @! Restored? Complex 18.5 Hours downtime $5,600/Min
NetApp Syncsort Integrated Backup
WHITE PAPER NetApp Syncsort Integrated Backup Protect your Microsoft and VMware Environment with NetApp Syncsort Integrated Backup Protecting Microsoft and VMware Executive Summary 3 Microsoft and VMware
Disk-to-Disk-to-Tape (D2D2T)
Where Disk Fits into Backup Tape originated in the 1950 s as the primary storage device for computers. It was one of the first ways to store data beyond the memory of a computer, which at the time was
Top 10 Best Practices of Backup and Replication for VMware and Hyper-V
WHITE PAPER Top 10 Best Practices of Backup and Replication for VMware and Hyper-V By David Davis, VMware vexpert Virtualization changes everything for IT infrastructure administration and management.
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
Backup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
CrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
Hybrid Cloud Backup and Recovery Software. Virtualization Support Real Backups of Virtual Environments
Hybrid Cloud Backup and Recovery Software Virtualization Support Asigra Inc. 1120 Finch Avenue West, Suite 400 Toronto, ON Canada M3J 3H7 tel: 416-736-8111 fax: 416-736-7120 email: [email protected] www.recoveryourcool.com
Backup, Recovery & Archiving. Choosing a data protection strategy that best suits your IT requirements and business needs.
A N AT L A N T I C - I T. N E T W H I T E PA P E R Choosing a data protection strategy that best suits your IT requirements and business needs. 2 EXECUTIVE SUMMARY Data protection has become the hydra
Leveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems
W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft
Introducing Arcserve Unified Data Protection
Introducing Arcserve Unified Data Protection Arcserve UDP is based on a next generation unified architecture for both virtual and physical environments. Its unmatched breadth, ease of use, and Assured
Dell Data Protection Point of View: Recover Everything. Every time. On time.
Dell Data Protection Point of View: Recover Everything. Every time. On time. Dell Data Protection White Paper May 2013 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
Solution Overview. Jesper Schneider Nordic Distribution Manager. 14 th May 2014. Copyright 2014 CA. All rights reserved.
Solution Overview Jesper Schneider Nordic Distribution Manager 14 th May 2014 Copyright 2014 CA. All rights reserved. Are you in control? Backup Backup Backup Recovery point objectives Recovery time objectives
Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication
Datasheet Asigra Cloud Backup V.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the
Virtualization backup tools: How the field stacks up
tools: How the field Searching for the right virtual backup tools can be a grueling process. While there are plenty of available options, you must make sure to select the most effective products for a
EMC RECOVERPOINT FAMILY
EMC RECOVERPOINT FAMILY Cost-effective local and remote data protection and disaster recovery solution ESSENTIALS Maximize application data protection and disaster recovery Protect business applications
Dell AppAssure Universal Recovery
Technology spotlight Dell AppAssure Universal Recovery The key to unlimited cross-platform restoration flexibility Universal Recovery is a built-in Dell AppAssure tool for recovering whole physical machines,
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
Top 5 Disaster Recovery Reports IT Risk and Business Continuity Managers Live For
Whitepaper Top 5 Disaster Recovery Reports IT Risk and Business Continuity Managers Live For 1. Disaster Recovery Runbook Report 2. Disaster Recovery Compliance Report 3. Disaster Recovery Listing: Virtual
