Every vendor new to a market generally starts by introducing a product that satisfies a niche to gain a foothold in that market. Comtrade Software exemplified this premise by earlier this year coming to market with its HYCU software that targets the protection of VMs hosted on the Nutanix AHV hypervisor. But to grow in a market, especially in the hyper-competitive virtual machine (VM) data protection space, one must expand to protect all market-leading hypervisors. Comtrade Software’s most recent HYCU release achieves that goal with its new support for VMware ESX.
DCIG Pocket Analyst Report Compares Dell EMC Data Domain and ExaGrid Product Families
Technology conversations within enterprises increasingly focus on the “data center stack” with an emphasis on cloud enablement. While I agree with this shift in thinking, one can too easily overlook the merits of underlying individual technologies when only considering the “Big Picture”. Such is happening with deduplication technology. A key enabler of enterprise archiving, data protecton, and disaster recovery solutions, vendors such as Dell EMC and ExaGrid deliver deduplication technology in different ways as DCIG’s most recent 4-page Pocket Analyst Report reveals that makes each product family better suited for specific use cases.
Vendors first started bandying about the phrase “cloud data management” a year or so ago. While that phrase caught my attention, specifics as what one should expect when acquiring a “cloud data management” solution remained nebulous at best. Fast forward to this week’s Veritas Vision 2017 and I finally encountered a vendor that was providing meaningful details as to what cloud data management encompasses while simultaneously performing a 180 behind the scenes.
The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing up your data no longer provides an absolute guarantee that you can recover from a ransomware attack. Here are three techniques that ransomware may use to circumvent existing backups and make your “good” backups bad.
The phrase “Cloud Data Protection Appliance” is included in the name of DCIG’s forthcoming Buyer’s Guide but the end game of each appliance covered in that Guide is squarely on recovery. While successful recoveries have theoretically always been the objective of backup appliances, vendors too often only paid lip service to that ideal as most of their new product features centered on providing better means for doing backups. Recent technology advancements have flipped this premise on its head.
As recently as a few years ago support for private and/or public cloud storage providers by enterprise data protection products was still a hit-or-miss proposition. Those days are essentially over. The vast majority of products minimally leverage cloud providers as cloud storage targets and, in many cases, use them for more advanced recovery options. But as support for the cloud has become commonplace, three specific new features appear on more of these products making them more flexible, manageable, and scalable while also serving to foretell what all these products will offer in the very near future.
There are two assumptions that IT professionals need to exercise caution before making when evaluating cloud data protection products. One is to assume all products share some feature or features in common. The other is to assume that one product possesses some feature or characteristic that no other product on the market offers. As DCIG reviews its recent research into the cloud data protection products, one cannot make either one of these assumptions, even on features such as deduplication, encryption, and replication that one might expect to be universally adopted by these products in comparable ways.
Backup products have always sought to differentiate themselves by offering specific features that met different organizational needs. But at the end of the day, backup products primarily had to account for protecting the data that organizations had with these products placing a lower priority on recovery and cloud connectivity. Those days are largely over with all backup products (save a few) having transformed to offer cloud data protection with many of them providing a variety of cloud recovery options.
Today’s backup mantra seems to be backup to the cloud or bust! But backup to the cloud is more than just redirecting backup streams from a local file share to a file share presented by a cloud storage provider and clicking the “Start” button. Organizations must examine to which cloud storage providers they can send their data as well as how their backup software packages and sends the data to the cloud. BackupAssist 10.0 answers many of these tough questions about cloud data protection that businesses face while providing them some welcomed flexibility in their choice of cloud storage providers.
Detect. Protect. Recover. I often see those three words when someone discusses the best methods for companies to deal with the scourge of ransomware. But stringing three words together in a marketing slogan does not a solution make. While understanding the steps needed to protect oneself against ransomware is certainly a requirement, knowing what features that backup software should possess and which products possess those features are equally important.
Last week HPE announced its acquisition of SimpliVity, a provider of enterprise hyper-converged infrastructure solutions. While that announcement certainly made news in the IT industry, the broader implications of this acquisition signaled that enterprise IT providers such as HPE could no longer sit on the sidelines and merely be content to partner with providers such as SimpliVity as hyper-converged solutions rapidly become a growing percentage of enterprise IT. If HPE wanted its fair share of this market, it was imperative that it act sooner rather than later to ensure it remained a leading player in this rapidly growing market.
DCIG is pleased to announce the availability of the 2016-17 Hybrid Cloud Backup Appliance Buyer’s Guide developed from the backup appliance body of research. As core business processes become digitized, the ability to keep services online and to rapidly recover from any service interruption becomes a critical need. Given the growth and maturation of cloud services, many organizations are exploring the advantages of storing application data with cloud providers and even recovering applications in the cloud.
Enterprises now demand higher levels of automation, integration, simplicity, and scalability from every component deployed into their IT infrastructure and the integrated backup appliances found in the DCIG’s forthcoming Buyer’s Guide Editions that cover integrated backup appliances are a clear output of those expectations. Intended for organizations that want to protect applications and data and then keep it behind corporate fire walls, these backup appliances come fully equipped from both hardware and software perspectives to do so.
DCIG is pleased to announce the availability of the following DCIG 2016-17 Deduplicating Backup Appliance Buyer’s Guide Editions developed from the backup appliance body of research. Other Buyer’s Guide Editions based on this body of research will be published in the coming weeks and months, including the 2016-17 Integrated Backup Appliance Buyer’s Guide and 2016-17 Hybrid Cloud Backup Appliance Buyer’s Guide Editions.
Hyperconverged infrastructure solutions stand poised to disrupt traditional IT architectures in every way possible. Combining compute, data protection, networking, memory, scale out, storage, and virtualization on a single platform, they deliver the benefits of traditional IT infrastructures without their associated complexities. But as organizations look to consolidate on hyperconverged infrastructure solutions, they need data protection services such as Pivot3’s Quality of Service (QoS) feature now found on its vSTAC SLX Hyperconverged product that enables organizations to better protect their applications.
Integrating backup software, cloud services support, deduplication, and virtualization into a single hardware appliance remains a moving target. Even as backup appliance providers merge these technologies into their respective appliances, the methodologies they employ to do so can differ significantly between them. This becomes very apparent when one looks at growing number of backup appliances from the providers in the market today.
More data to backup, less time to recover it, heightened recovery expectations and limited time to dedicate to manage these tasks. These are the dilemmas that every mid-market business faces when backing up and recovering its data. The good news is that the DL1300 Backup and Recovery Appliance offers the specific features that mid-market companies need to address these issues. Delivered as a turn-key, easy-to-deploy solution, the DL1300 offers the comprehensive set of features that mid-market companies need to reduce their time spent on backups, replication and/or archiving data to low cost 3rd party cloud locations.
It was just a couple of months ago that I became aware that enterprise file sync-and-share capabilities were available for the first time behind corporate file walls with the introduction of Nexsan’s UNITY product. While at the time I could not find another storage system that offered similar capabilities, that all changed this week when HGST, a subsidiary of Western Digital, announced that it had partnered with CTERA, to offer a competitive product in the private enterprise file sync-and-share space.
Every now and then a technology comes along that prompts enterprises to a complete do-over of their existing data center infrastructures. This type of dramatic change is already occurring within organizations of all sizes who are adopting and implementing SimpliVity.
Every now and then I hear rumors in the market place that the only backup software product that Dell puts any investment into is Dell Data Protection | Rapid Recovery while it lets NetVault and vRanger wither on the vine. Nothing could be further from the truth. In this third and final part of my interview series with Michael Grant, director of data protection product marketing for Dell’s systems and information management group, he refutes those rumors and illustrates how both the NetVault and vRanger products are alive and kicking within Dell’s software portfolio.