was successfully added to your cart.
Category

Data Protection

Hackers Say Goodbye to Ransomware and Hello to Bitcoin Mining

By | Cloud, Cloud Computing, Data Protection, Performance, SaaS | No Comments

Ransomware gets a lot of press – and for good reason – because when hackers break through your firewalls, encrypt your data, and make you pay up or else lose your data, it rightfully gets people’s attention. But hackers probably have less desire than most to be in the public eye and sensationalized ransomware headlines bring them unwanted attention. That’s why some hackers have said goodbye to the uncertainty of a payout associated with getting a ransom for your data and instead look to access your servers to do some bitcoin mining using your CPUs.

Read More

Nutanix Backup Software: Make the Best Choice Between HYCU and Rubrik

By | Data Protection, Hyper-converged | No Comments

Organizations of all sizes now look to hyper-converged infrastructure solutions such as the Nutanix Enterprise Cloud Platform to provide them with their next generation of data center IT infrastructure services. As they do, they need software optimized for protecting Nutanix environments. HYCU, Inc., and Rubrik are two early leaders in this space. Each possess distinctive attributes that make one or the other better suited for providing data protection services when these conditions exist in your environment.

Read More

HYCU Branches Out to Tackle ESX Backups in non-Nutanix Shops

By | Data Protection, Virtualization | No Comments

A virtualization focused backup software play may be perceived as “too little, too late” with so many players in today’s backup space. However, many former virtualization centric backup software plays (PHD Virtual and vRanger come to mind) have largely disappeared while others got pricier and/or no longer do just VM backups. These changes have once again created a need for a virtualization centric backup software solution. This plays right into the hands of the newly created HYCU as it formally tackles the job of ESX virtual machine (VM) backups in non-Nutanix shops.

Read More

Seven Key Differentiators between the Cohesity DataPlatform and Rubrik Cloud Data Management HCIA Solutions

By | Data Protection, Hyper-converged | No Comments

Hyper-converged infrastructure architectures (HCIAs) are foundational for the next generation of data centers. Key to realizing that vision is to implement HCIA solutions for both primary and secondary storage. The Cohesity DataPlatform and Rubrik Cloud Data Management solutions have emerged as the early leaders in this rapidly growing market segment. While these two products share many features in common, seven key points of differentiation between them yet exist as the latest DCIG Pocket Analyst Report reveals.

Read More

A More Elegant (and Affordable) Approach to Nutanix Backups

By | Backup Appliance, Data Protection, Data Reduction, Deduplication, Disaster Recovery | No Comments

One of the more perplexing challenges that Nutanix administrators face is how to protect the data in their Nutanix deployments. Granted, Nutanix natively offers its own data protection utilities. However, these utilities leave gaps that enterprises are unlikely to find palatable when protecting their production applications. This is where Comtrade Software’s HYCU and ExaGrid come into play as their combined solutions provide a more affordable and elegant approach to protecting Nutanix environments.

Read More

Differentiating between the Dell EMC Data Domain and ExaGrid EX Systems

By | Backup Appliance, Data Protection, Deduplication | No Comments

Deduplication backup target appliances remain a critical component of the data protectioninfrastructure for many enterprises. While storing protected data in the cloud may be fine for very small businesses or even as a final resting place for enterprise data, deduplication backup target appliances continue to function as their primary backup target and primary source for recovering data. It is for these reasons that enterprises frequently turn to deduplication backup target appliances from Dell EMC and ExaGrid to meet these specific needs that are covered in recent DCIG Pocket Analyst Report.

Read More

Glitch is the Next Milestone in Recoveries

By | Business Continuity, Cloud, Continuous Data Protection, Data Protection, Disaster Recovery, Disaster Recovery High Availability Clustering | No Comments

No business – and I mean no business – regardless of its size ever wants to experience an outage for any reason or duration. However, to completely avoid outages means spending money and, in most cases, a lot of money. That is why, when someone shared with me earlier this week, that one of their clients has put in place a solution that keeps their period of downtime to what appears as a ‘glitch’ to their end-users for nominal cost, it struck a chord with me.

Read More

2017 Reflects the Tipping Point in IT Infrastructure Design and Protection

By | Business Continuity, Data Protection, Hyper-converged | One Comment

At the end of the year people naturally reflect on the events of the past year and look forward to the new. I am no different. It is as I reflect on the past year and look ahead on how IT infrastructures within organizations have changed and will change, 2017 has been as transformative as any year in the past decade if not the past 50 years. While that may sound presumptuous, 2017 seems to be the year that reflects the tipping point in how organizations will build out and protect their infrastructures going forward.

Read More

Comtrade Software goes beyond AHV, Adds ESX Support

By | Data Protection, Virtualization | No Comments

Every vendor new to a market generally starts by introducing a product that satisfies a niche to gain a foothold in that market. Comtrade Software exemplified this premise by earlier this year coming to market with its HYCU software that targets the protection of VMs hosted on the Nutanix AHV hypervisor. But to grow in a market, especially in the hyper-competitive virtual machine (VM) data protection space, one must expand to protect all market-leading hypervisors. Comtrade Software’s most recent HYCU release achieves that goal with its new support for VMware ESX.

Read More

Deduplication Still Matters in Enterprise Clouds as Data Domain and ExaGrid Prove

By | Backup Appliance, Data Protection, Data Reduction, DCIG, Deduplication, Disaster Recovery, Disk Based Backup, Pocket Analyst Report | No Comments

DCIG Pocket Analyst Report Compares Dell EMC Data Domain and ExaGrid Product Families

Technology conversations within enterprises increasingly focus on the “data center stack” with an emphasis on cloud enablement. While I agree with this shift in thinking, one can too easily overlook the merits of underlying individual technologies when only considering the “Big Picture”. Such is happening with deduplication technology. A key enabler of enterprise archiving, data protecton, and disaster recovery solutions, vendors such as Dell EMC and ExaGrid deliver deduplication technology in different ways as DCIG’s most recent 4-page Pocket Analyst Report reveals that makes each product family better suited for specific use cases.

Read More

Veritas Delivering on its 360 Data Management Strategy While Performing a 180

By | Business Continuity, Cloud, Cloud Computing, Cloud Storage, Data Protection, Deduplication | No Comments

Vendors first started bandying about the phrase “cloud data management” a year or so ago. While that phrase caught my attention, specifics as what one should expect when acquiring a “cloud data management” solution remained nebulous at best. Fast forward to this week’s Veritas Vision 2017 and I finally encountered a vendor that was providing meaningful details as to what cloud data management encompasses while simultaneously performing a 180 behind the scenes.

Read More

Ransomware Possesses Three Techniques to Turn “Good” Backups Bad

By | Data Protection | One Comment

The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing up your data no longer provides an absolute guarantee that you can recover from a ransomware attack. Here are three techniques that ransomware may use to circumvent existing backups and make your “good” backups bad.

Read More

The End Game for Cloud Data Protection Appliances is Recovery

By | Backup Appliance, Buyer's Guides, Cloud, Cloud Storage, Data Protection, DCIG, Disaster Recovery | No Comments

The phrase “Cloud Data Protection Appliance” is included in the name of DCIG’s forthcoming Buyer’s Guide but the end game of each appliance covered in that Guide is squarely on recovery. While successful recoveries have theoretically always been the objective of backup appliances, vendors too often only paid lip service to that ideal as most of their new product features centered on providing better means for doing backups. Recent technology advancements have flipped this premise on its head.

Read More

Three Features that Foreshadow the Next Generation of Data Protection Capabilities

By | Cloud, Data Protection | No Comments

As recently as a few years ago support for private and/or public cloud storage providers by enterprise data protection products was still a hit-or-miss proposition. Those days are essentially over. The vast majority of products minimally leverage cloud providers as cloud storage targets and, in many cases, use them for more advanced recovery options. But as support for the cloud has become commonplace, three specific new features appear on more of these products making them more flexible, manageable, and scalable while also serving to foretell what all these products will offer in the very near future.

Read More

Exercise Caution Before Making Any Assumptions about Cloud Data Protection Products

By | Cloud, Cloud Storage, Continuous Data Protection, Data Protection, Data Reduction, Deduplication, Encryption, Replication | No Comments

There are two assumptions that IT professionals need to exercise caution before making when evaluating cloud data protection products. One is to assume all products share some feature or features in common. The other is to assume that one product possesses some feature or characteristic that no other product on the market offers. As DCIG reviews its recent research into the cloud data protection products, one cannot make either one of these assumptions, even on features such as deduplication, encryption, and replication that one might expect to be universally adopted by these products in comparable ways.

Read More

The Transformation of Backup to Cloud Data Protection is Now Complete

By | Cloud, Data Protection, Online Backup | No Comments

Backup products have always sought to differentiate themselves by offering specific features that met different organizational needs. But at the end of the day, backup products primarily had to account for protecting the data that organizations had with these products placing a lower priority on recovery and cloud connectivity. Those days are largely over with all backup products (save a few) having transformed to offer cloud data protection with many of them providing a variety of cloud recovery options.

Read More

BackupAssist 10.0 Brings Welcomed Flexibility for Cloud Backup to Windows Shops

By | Cloud, Cloud Storage, Data Protection, Deduplication, Disk Based Backup | No Comments

Today’s backup mantra seems to be backup to the cloud or bust! But backup to the cloud is more than just redirecting backup streams from a local file share to a file share presented by a cloud storage provider and clicking the “Start” button. Organizations must examine to which cloud storage providers they can send their data as well as how their backup software packages and sends the data to the cloud. BackupAssist 10.0 answers many of these tough questions about cloud data protection that businesses face while providing them some welcomed flexibility in their choice of cloud storage providers.

Read More

Backup Features That Will Help You Win the Ransomware Wars

By | Data Protection, DCIG | No Comments

Detect. Protect. Recover. I often see those three words when someone discusses the best methods for companies to deal with the scourge of ransomware. But stringing three words together in a marketing slogan does not a solution make. While understanding the steps needed to protect oneself against ransomware is certainly a requirement, knowing what features that backup software should possess and which products possess those features are equally important.

Read More

DCIG Quick Look: Acquisition of SimpliVity Fits Right into HPE’s Broader Hybrid IT Strategy

By | Cloud Storage, Converged Infrastructure, Data Protection | No Comments

Last week HPE announced its acquisition of SimpliVity, a provider of enterprise hyper-converged infrastructure solutions. While that announcement certainly made news in the IT industry, the broader implications of this acquisition signaled that enterprise IT providers such as HPE could no longer sit on the sidelines and merely be content to partner with providers such as SimpliVity as hyper-converged solutions rapidly become a growing percentage of enterprise IT. If HPE wanted its fair share of this market, it was imperative that it act sooner rather than later to ensure it remained a leading player in this rapidly growing market.

Read More
image_pdfimage_print