Hyper-converged infrastructure appliances (HCIAs) radically simplify the next generation of data center architectures. Combining and/or virtualizing compute, memory, storage, networking, and data protection functions from a single vendor in a scale-out cluster, these pre-integrated appliances accelerate and simplify infrastructure deployments and management. As such, the stakes are high for Dell EMC and Nutanix who are competing to own this critical piece of data center infrastructure real estate.
Every vendor new to a market generally starts by introducing a product that satisfies a niche to gain a foothold in that market. Comtrade Software exemplified this premise by earlier this year coming to market with its HYCU software that targets the protection of VMs hosted on the Nutanix AHV hypervisor. But to grow in a market, especially in the hyper-competitive virtual machine (VM) data protection space, one must expand to protect all market-leading hypervisors. Comtrade Software’s most recent HYCU release achieves that goal with its new support for VMware ESX.
DCIG is pleased to announce the availability of the DCIG 2018 Deduplication Backup Target Appliance Buyer’s Guide developed from the cloud data protection body of research. The DCIG 2018 Deduplication Backup Target Appliance Buyer’s Guide weights, scores and ranks more than 100 features of twenty-two (22) products from six (6) vendors. Using ranking categories of Recommended, Excellent, and Good this Buyer’s Guide offers much of the information an organization should need to make a highly-informed decision as to which deduplication backup target appliance will suit their needs.
Many organizations view hyper-converged infrastructure appliances (HCIAs) as foundational for the cloud data center architecture of the future. However, as part of an HCIA solution, one must also select a hypervisor to run on this platform. The VMware vSphere and Nutanix AHV hypervisors are two common choices but key differences between them persist.
As human beings we have a proclivity to believe that whatever it is we as an individual or as a society experience, we are the first to go through an event like it. By way of example, corporate IT is undergoing a transformation as enterprises change IT to better align it with the broader business. Ironically, this IT reformation takes place on the 500th anniversary of a more well-known reformation that occurred in 1517.
Hybrid and all-disk arrays still have their place in enterprise data centers but all-flash arrays are “where it’s at” when it comes to hosting and accelerating the performance of production applications. Once reserved only for applications that could cost-justify these arrays, continuing price erosion in the underlying flash media coupled with technologies such as compression and deduplication have put these arrays at a price point within reach of almost any size enterprise. As that occurs, all-flash arrays from Dell EMC XtremIO and Pure Storage are often on the buying short lists for many companies. Those companies considering these two products can turn to a recent DCIG Pocket Analyst Report that compares these two products to help them make an informed buying decision.
DCIG Pocket Analyst Report Compares Dell EMC Data Domain and ExaGrid Product Families
Technology conversations within enterprises increasingly focus on the “data center stack” with an emphasis on cloud enablement. While I agree with this shift in thinking, one can too easily overlook the merits of underlying individual technologies when only considering the “Big Picture”. Such is happening with deduplication technology. A key enabler of enterprise archiving, data protecton, and disaster recovery solutions, vendors such as Dell EMC and ExaGrid deliver deduplication technology in different ways as DCIG’s most recent 4-page Pocket Analyst Report reveals that makes each product family better suited for specific use cases.
2017 might well be the year that backup and recovery went from being viewed as a corporate insurance policy for data to a key business enabler and for good reasons. Natural disasters and ransomware attacks have heightened the need for fast, reliable backups and recoveries while new backup product architectures are changing the conversation around what services that cloud data protection appliances can deliver. As organizations go to select one of the current generation of cloud data protection appliances, here are four considerations they should keep in mind.
Comtrade Software’s release of HYCU backup software a few months ago validated that Nutanix’s impact on the enterprise data center was real as HYCU specifically targets Nutanix environments. But one release does not a product make. That’s what makes Comtrade’s follow-on announcement notable. HYCU’s expanded support for more applications and cloud solutions, addition of new encryption features, and tweaks to more quickly complete backups reflect Comtrade’s commitment to diving deeper into the protection of Nutanix AOS environments.
DCIG is pleased to announce the availability of the DCIG 2017-18 Cloud Data Protection Appliance Buyer’s Guide developed from the backup appliance body of research. The DCIG 2017-18 Cloud Data Protection Appliance Buyer’s Guide weights, scores and ranks more than 100 features of twenty-two (22) products from six (6) vendors. Using ranking categories of Recommended and Excellent, this Buyer’s Guide offers much of the information an organization should need to make a highly-informed decision as to which cloud data protection appliance will suit their needs.
Vendors first started bandying about the phrase “cloud data management” a year or so ago. While that phrase caught my attention, specifics as what one should expect when acquiring a “cloud data management” solution remained nebulous at best. Fast forward to this week’s Veritas Vision 2017 and I finally encountered a vendor that was providing meaningful details as to what cloud data management encompasses while simultaneously performing a 180 behind the scenes.
The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing up your data no longer provides an absolute guarantee that you can recover from a ransomware attack. Here are three techniques that ransomware may use to circumvent existing backups and make your “good” backups bad.
In recent months and years, many have come to question VMware’s commitment to public clouds and containers used by enterprise data centers (EDCs). No one disputes that VMware has a solid footprint in EDCs and that it is in no immediate danger of being displaced. However, many have wondered how or if it will engage with public cloud providers such as Amazon as well as how it would address threats posed by Docker. At VMworld 2017, VMware showed new love for these two technologies that should help to alleviate these concerns.
Next-generation all-flash arrays will provide dramatic improvements in performance and density over the prior generation of all-flash arrays. These new levels of performance and density will bring the benefits of real-time analysis to a whole new set of problems and organizations, creating tremendous value. They will also enable organizations to achieve significant budget savings through a fresh wave of data center consolidations. But unlocking the ability of any next-generation array to deliver these savings depends on a key set of features that enable workload consolidation and simplified management.
The phrase “Cloud Data Protection Appliance” is included in the name of DCIG’s forthcoming Buyer’s Guide but the end game of each appliance covered in that Guide is squarely on recovery. While successful recoveries have theoretically always been the objective of backup appliances, vendors too often only paid lip service to that ideal as most of their new product features centered on providing better means for doing backups. Recent technology advancements have flipped this premise on its head.
The business case for organizations with petabytes of file data under management to classify and then place it across multiple tiers of storage has never been greater. By distributing this data across disk, flash, tape and the cloud, they stand to realize significant cost savings. The catch is finding a cost-effective solution that makes it easier to administer and manage file data than simply storing it all on flash storage. This is where a solution such as what Quantum now offers come into play.
The annual Flash Memory Summit is where vendors reveal to the world the future of storage technology. Many companies announced innovative products and technical advances at last week’s 2017 Flash Memory Summit that give enterprises a good understanding of what to expect from today’s all-flash products today as well as a glimpse into tomorrow’s products. These previews into the next generation of flash products revealed four flash memory trends sure to influence the development of the next generation of all-flash arrays.
As recently as a few years ago support for private and/or public cloud storage providers by enterprise data protection products was still a hit-or-miss proposition. Those days are essentially over. The vast majority of products minimally leverage cloud providers as cloud storage targets and, in many cases, use them for more advanced recovery options. But as support for the cloud has become commonplace, three specific new features appear on more of these products making them more flexible, manageable, and scalable while also serving to foretell what all these products will offer in the very near future.
Today organizations more so than ever are looking to move to software-defined data centers. Whether they adopt software-defined storage, networking, computing, servers, security, or all of them as part of this initiative, they are starting to conclude that a software-defined world trumps the existing hardware defined one. While I agree with this philosophy in principle, organizations need to carefully dip their toe into the software-defined waters and not dive head-first.
There are two assumptions that IT professionals need to exercise caution before making when evaluating cloud data protection products. One is to assume all products share some feature or features in common. The other is to assume that one product possesses some feature or characteristic that no other product on the market offers. As DCIG reviews its recent research into the cloud data protection products, one cannot make either one of these assumptions, even on features such as deduplication, encryption, and replication that one might expect to be universally adopted by these products in comparable ways.