Tag Archives: Veeam

News: Veeam Fends Off Symantec Lawsuit

VirtualizationBackupVeeam has successfully fended off a patent infringement suit brought by Symantec over how Veeam does its backups. Yet, Symantec did not bring a suit against VMware, which created the underlying technology that Veeam employs for pulling data from a vSphere environment. When you look at the court case, it is about older technology and older patents, not Veeam’s latest innovations. I found this rather interesting—that instead of going after VMware, Symantec tried to sue the little guy out of existence. We all know this is not the first time someone has tried to do that.

Continue reading News: Veeam Fends Off Symantec Lawsuit

Data Protection: All Starts with an Architecture

VirtualizationBackupAt The Virtualization Practice, we have systems running in the cloud as well as on-premises. We run a 100% virtualized environment, with plenty of data protection, backup, and recovery options. These are all stitched together using one architecture: an architecture developed through painful personal experiences. We just had an interesting failure—nothing catastrophic, but it could have been, without the proper mindset and architecture around data protection. Data protection these days does not just mean backup and recovery, but also prevention and redundancy.  Continue reading Data Protection: All Starts with an Architecture

Cloud Dependency: Data Protection and Security

VirtualizationSecurityThe premise of security is confidentiality, integrity, and availability. The premise of data protection is integrity and availability. The two go hand in hand. However, it is often the case that certain groups within organizations handle data protection (disaster recovery, business continuity, and backup) while other groups handle security. As security moves closer and closer to the data, could it perhaps be time for these two disciplines to become one? The security of data protection is becoming just as important as the security of the data within use. The management of the security of in-use data and protected data, regardless of location, is paramount. This means data stored on-premises, in the cloud, and remotely. Continue reading Cloud Dependency: Data Protection and Security

Cloud Computing Pitfalls

CloudComputingWe are still coming to grips with the impact of the Xen and Bash shell issues that have sprung up lately. The issues are enough to make us realize that there are some serious pitfalls to cloud computing—or more to the point, pitfalls to using only one cloud service provider. We talk about using live migration and other tools to alleviate downtime, but have we really thought through the use of these tools at cloud scale? What was the impact on your environment, and how have you decided to alleviate that impact? Those are the questions that come out of the latest set of issues with cloud computing. Continue reading Cloud Computing Pitfalls

News: Veeam Enters Physical Backup Land

VirtualizationBackupOctober 8, 2014: Today at the Las Vegas VeeamON conference, Veeam announced its first foray into the world of physical device backup. With the rather catchy name “Veeam Endpoint Backup Free,” the product, when it is released, will be able to back up a physical endpoint (read Windows-based operating system) to a NAS share or a Veeam backup repository.

Continue reading News: Veeam Enters Physical Backup Land

Next-Generation Data Protection: Realities

VirtualizationBackupIn the past, I have written about the next generation of data protection, which combines analytics with broader data and holistic system protection into one easy-to-use product (or set of products). The goal is to take disaster recovery to the future, when we will be able to restore and test our restores of not just our data, but also the systems required to make that data accessible, including all networking and security constructs. If you were to have a massive disaster, could your disaster recovery techniques restore your entire environment at just a push of a button? Does your disaster recovery testing feed back into analytics to determine what needs to change to make this a reality?  Continue reading Next-Generation Data Protection: Realities