was successfully added to your cart.
Category

Data Protection

Deduplication Still Matters in Enterprise Clouds as Data Domain and ExaGrid Prove

By | Backup Appliance, Data Protection, Data Reduction, DCIG, Deduplication, Disaster Recovery, Disk Based Backup, Pocket Analyst Report | No Comments

DCIG Pocket Analyst Report Compares Dell EMC Data Domain and ExaGrid Product Families

Technology conversations within enterprises increasingly focus on the “data center stack” with an emphasis on cloud enablement. While I agree with this shift in thinking, one can too easily overlook the merits of underlying individual technologies when only considering the “Big Picture”. Such is happening with deduplication technology. A key enabler of enterprise archiving, data protecton, and disaster recovery solutions, vendors such as Dell EMC and ExaGrid deliver deduplication technology in different ways as DCIG’s most recent 4-page Pocket Analyst Report reveals that makes each product family better suited for specific use cases.

Read More

Veritas Delivering on its 360 Data Management Strategy While Performing a 180

By | Business Continuity, Cloud, Cloud Computing, Cloud Storage, Data Protection, Deduplication | No Comments

Vendors first started bandying about the phrase “cloud data management” a year or so ago. While that phrase caught my attention, specifics as what one should expect when acquiring a “cloud data management” solution remained nebulous at best. Fast forward to this week’s Veritas Vision 2017 and I finally encountered a vendor that was providing meaningful details as to what cloud data management encompasses while simultaneously performing a 180 behind the scenes.

Read More

Ransomware Possesses Three Techniques to Turn “Good” Backups Bad

By | Data Protection | One Comment

The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing up your data no longer provides an absolute guarantee that you can recover from a ransomware attack. Here are three techniques that ransomware may use to circumvent existing backups and make your “good” backups bad.

Read More

The End Game for Cloud Data Protection Appliances is Recovery

By | Backup Appliance, Buyer's Guides, Cloud, Cloud Storage, Data Protection, DCIG, Disaster Recovery | No Comments

The phrase “Cloud Data Protection Appliance” is included in the name of DCIG’s forthcoming Buyer’s Guide but the end game of each appliance covered in that Guide is squarely on recovery. While successful recoveries have theoretically always been the objective of backup appliances, vendors too often only paid lip service to that ideal as most of their new product features centered on providing better means for doing backups. Recent technology advancements have flipped this premise on its head.

Read More

Three Features that Foreshadow the Next Generation of Data Protection Capabilities

By | Cloud, Data Protection | No Comments

As recently as a few years ago support for private and/or public cloud storage providers by enterprise data protection products was still a hit-or-miss proposition. Those days are essentially over. The vast majority of products minimally leverage cloud providers as cloud storage targets and, in many cases, use them for more advanced recovery options. But as support for the cloud has become commonplace, three specific new features appear on more of these products making them more flexible, manageable, and scalable while also serving to foretell what all these products will offer in the very near future.

Read More

Exercise Caution Before Making Any Assumptions about Cloud Data Protection Products

By | Cloud, Cloud Storage, Continuous Data Protection, Data Protection, Data Reduction, Deduplication, Encryption, Replication | No Comments

There are two assumptions that IT professionals need to exercise caution before making when evaluating cloud data protection products. One is to assume all products share some feature or features in common. The other is to assume that one product possesses some feature or characteristic that no other product on the market offers. As DCIG reviews its recent research into the cloud data protection products, one cannot make either one of these assumptions, even on features such as deduplication, encryption, and replication that one might expect to be universally adopted by these products in comparable ways.

Read More

The Transformation of Backup to Cloud Data Protection is Now Complete

By | Cloud, Data Protection, Online Backup | No Comments

Backup products have always sought to differentiate themselves by offering specific features that met different organizational needs. But at the end of the day, backup products primarily had to account for protecting the data that organizations had with these products placing a lower priority on recovery and cloud connectivity. Those days are largely over with all backup products (save a few) having transformed to offer cloud data protection with many of them providing a variety of cloud recovery options.

Read More

BackupAssist 10.0 Brings Welcomed Flexibility for Cloud Backup to Windows Shops

By | Cloud, Cloud Storage, Data Protection, Deduplication, Disk Based Backup | No Comments

Today’s backup mantra seems to be backup to the cloud or bust! But backup to the cloud is more than just redirecting backup streams from a local file share to a file share presented by a cloud storage provider and clicking the “Start” button. Organizations must examine to which cloud storage providers they can send their data as well as how their backup software packages and sends the data to the cloud. BackupAssist 10.0 answers many of these tough questions about cloud data protection that businesses face while providing them some welcomed flexibility in their choice of cloud storage providers.

Read More

Backup Features That Will Help You Win the Ransomware Wars

By | Data Protection, DCIG | No Comments

Detect. Protect. Recover. I often see those three words when someone discusses the best methods for companies to deal with the scourge of ransomware. But stringing three words together in a marketing slogan does not a solution make. While understanding the steps needed to protect oneself against ransomware is certainly a requirement, knowing what features that backup software should possess and which products possess those features are equally important.

Read More

DCIG Quick Look: Acquisition of SimpliVity Fits Right into HPE’s Broader Hybrid IT Strategy

By | Cloud Storage, Converged Infrastructure, Data Protection | No Comments

Last week HPE announced its acquisition of SimpliVity, a provider of enterprise hyper-converged infrastructure solutions. While that announcement certainly made news in the IT industry, the broader implications of this acquisition signaled that enterprise IT providers such as HPE could no longer sit on the sidelines and merely be content to partner with providers such as SimpliVity as hyper-converged solutions rapidly become a growing percentage of enterprise IT. If HPE wanted its fair share of this market, it was imperative that it act sooner rather than later to ensure it remained a leading player in this rapidly growing market.

Read More

DCIG 2016-17 Hybrid Cloud Backup Appliance Buyer’s Guide Now Available

By | Backup Appliance, Buyer's Guides, Cloud, Cloud Storage, Data Protection, Deduplication, Disaster Recovery, Disk Based Backup, Online Backup, Tiered Data Systems | No Comments

DCIG is pleased to announce the availability of the 2016-17 Hybrid Cloud Backup Appliance Buyer’s Guide developed from the backup appliance body of research. As core business processes become digitized, the ability to keep services online and to rapidly recover from any service interruption becomes a critical need. Given the growth and maturation of cloud services, many organizations are exploring the advantages of storing application data with cloud providers and even recovering applications in the cloud.

Read More

Data Visualization, Recovery, and Simplicity of Management Emerging as Differentiating Features on Integrated Backup Appliances

By | Backup Appliance, Buyer's Guides, Data Protection, Data Reduction, Deduplication, Disaster Recovery, Disk Based Backup, Hyper-converged | No Comments

Enterprises now demand higher levels of automation, integration, simplicity, and scalability from every component deployed into their IT infrastructure and the integrated backup appliances found in the DCIG’s forthcoming Buyer’s Guide Editions that cover integrated backup appliances are a clear output of those expectations. Intended for organizations that want to protect applications and data and then keep it behind corporate fire walls, these backup appliances come fully equipped from both hardware and software perspectives to do so.

Read More

DCIG 2016-17 Deduplicating Backup Appliance Buyer’s Guide Editions Now Available

By | Backup Appliance, Buyer's Guides, Data Management, Data Protection, Deduplication, Disk Based Backup | No Comments

DCIG is pleased to announce the availability of the following DCIG 2016-17 Deduplicating Backup Appliance Buyer’s Guide Editions developed from the backup appliance body of research. Other Buyer’s Guide Editions based on this body of research will be published in the coming weeks and months, including the 2016-17 Integrated Backup Appliance Buyer’s Guide and 2016-17 Hybrid Cloud Backup Appliance Buyer’s Guide Editions.

Read More

Pivot3 QoS Positions Organizations to Introduce and Maintain Order in their Hyperconverged Deployments

By | Data Protection, Hyper-converged, Replication | No Comments

Hyperconverged infrastructure solutions stand poised to disrupt traditional IT architectures in every way possible. Combining compute, data protection, networking, memory, scale out, storage, and virtualization on a single platform, they deliver the benefits of traditional IT infrastructures without their associated complexities. But as organizations look to consolidate on hyperconverged infrastructure solutions, they need data protection services such as Pivot3’s Quality of Service (QoS) feature now found on its vSTAC SLX Hyperconverged product that enables organizations to better protect their applications.

Read More

Feature Consolidation on Backup Appliances Currently Under Way

By | Cloud, Data Protection, Deduplication, Virtualization | No Comments

Integrating backup software, cloud services support, deduplication, and virtualization into a single hardware appliance remains a moving target. Even as backup appliance providers merge these technologies into their respective appliances, the methodologies they employ to do so can differ significantly between them. This becomes very apparent when one looks at growing number of backup appliances from the providers in the market today.

Read More

Latest Enhancements to Dell DL1300 Provide the Out-of-the-box Backup, Recovery, and DR Experience that Mid-market Companies Demand

By | Backup Appliance, Data Protection, DCIG Sponsored Analysis | No Comments

More data to backup, less time to recover it, heightened recovery expectations and limited time to dedicate to manage these tasks. These are the dilemmas that every mid-market business faces when backing up and recovering its data. The good news is that the DL1300 Backup and Recovery Appliance offers the specific features that mid-market companies need to address these issues. Delivered as a turn-key, easy-to-deploy solution, the DL1300 offers the comprehensive set of features that mid-market companies need to reduce their time spent on backups, replication and/or archiving data to low cost 3rd party cloud locations.

Read More

Private Enterprise File Sync-and-Share … and then There were Two

By | Data Protection, Nexsan Technologies | No Comments

It was just a couple of months ago that I became aware that enterprise file sync-and-share capabilities were available for the first time behind corporate file walls with the introduction of Nexsan’s UNITY product. While at the time I could not find another storage system that offered similar capabilities, that all changed this week when HGST, a subsidiary of Western Digital, announced that it had partnered with CTERA, to offer a competitive product in the private enterprise file sync-and-share space.

Read More

SimpliVity Hyper-converged Solution Already Driving Enterprises to Complete Do-overs of their Data Center Infrastructures

By | Cloud Storage, Data Center Management, Data Protection, Disaster Recovery, Hyper-converged | One Comment

Every now and then a technology comes along that prompts enterprises to a complete do-over of their existing data center infrastructures. This type of dramatic change is already occurring within organizations of all sizes who are adopting and implementing SimpliVity.

Read More

Dell NetVault and vRanger are Alive and Kicking; Interview with Dell’s Michael Grant, Part 3

By | Business Continuity, Data Protection, Disaster Recovery, Disk Based Backup | No Comments

Every now and then I hear rumors in the market place that the only backup software product that Dell puts any investment into is Dell Data Protection | Rapid Recovery while it lets NetVault and vRanger wither on the vine. Nothing could be further from the truth. In this third and final part of my interview series with Michael Grant, director of data protection product marketing for Dell’s systems and information management group, he refutes those rumors and illustrates how both the NetVault and vRanger products are alive and kicking within Dell’s software portfolio.

Read More

The Inability to do a Server Recovery in Minutes May Become a Resume Generating Event; Interview with Dell’s Michael Grant, Part 1

By | Data Protection, Disaster Recovery | No Comments

In the last few years, anytime I get an update on new features from almost any provider of data protection products, I can almost guarantee they will talk about how they have improved their ability to do recovery. But perhaps no one better articulated why they need to improve recovery than Michael Grant, director of data protection product marketing for Dell’s systems and information management group. In this first installment in my interview series with Michael, he summarizes some of the latest features available in Dell’s data protection line and why organizations are laser-focused on recovery like never before.

Read More
image_pdfimage_print