Tag Archives: Veeam

Tenant and Multi-Tenant Security: It’s All About Scope

CloudComputingWhile at InfoSec World 2012’s summit on Cloud and Virtualization Security, the first talk was on Securing your data. The second was on penetration testing to ensure that data was secure.  In essence it has always been about the data but there is a huge difference between what a tenant can do  and what the cloud or virtual environment provider can do with respect to data protection and security. This gap is apparently becoming wider instead of smaller as we try to understand tenant vs cloud provider security scopes. There is a lack of transparency with respect to security, but at the same time there are movements to gain that transparency. But secret sauces, scopes, legislation, and lack of knowledge seem to be getting in the way. Continue reading Tenant and Multi-Tenant Security: It’s All About Scope

Future Proofing Data Protection: Approaching Fast!

VirtualizationBackupQuantum recently announced a ‘Flexible path to Next Generation Backup and Disaster Recovery’, which dovetails nicely with my thoughts on future proofing data protection.  Quantum has created, with the help of Xerox, a way to have multi-tenant data protection at the level of the tenant and not just the cloud provider. How does Quantum and Xerox achieve multi-tenant data protection? Is the future described here? Are there any other technologies that push this envelope as well? Continue reading Future Proofing Data Protection: Approaching Fast!

Future Proofing Data Protection

VirtualizationBackupDuring a briefing of Quest’s new data protection announcements I started to think about the future of data protection. Quest recently announced that NetVault will now work with Exagrid devices and that there is now a Capacity Edition targeting SMBs and SMEs. These changes add some more capabilities to an existing product suite. While, these announcements do not necessarily merge with virtualization backup, the combination of Quest’s tools and partnerships do form an impressive view of the future with respect to Data Protection. But is this future here now or even achievable? Continue reading Future Proofing Data Protection

Application Aware Virtualization Backup

VirtualizationBackupWhile participating in the GestaltIT Virtualization Field Day #2, I was asking Symantec about Application Aware Backups. In other words, could one backup an entire application, regardless of how the application was defined. This concept goes hand in hand with Application Aware Security measures. We can always backup VMs and their data to remote locations, but can we backup or maintain the application interactions within a multi-VM Application regardless of how it is defined. Continue reading Application Aware Virtualization Backup

Data Protection In the Cloud

One of the questions I get from time to time is, can I store my data in the cloud? At the NEVMUG, this came up once more. There is currently a lot of uncertainty about cloud storage, specifically when it comes to critical and highly regulated data. Where should I store my data, dovetails nicely with discussions of going to the cloud as well as data protection is a key component of such a migration. Continue reading Data Protection In the Cloud

Data Protection: Implement before you Need It

Data Protection techniques should be implemented and tested long before they are needed. This is a necessary component of any IT organization. However, the most recent VMware communities podcast brought to light several implementation aspects of Data Protection, specifically about Disaster Recovery: organizations still do not test their DR plans and organizations are waiting for a hardware refresh to implement a DR plan.

The first issue is about services that are too important to fail, and the other is about planning. However, what they both boil down to is dollars and the Fear that either loss of money, or that data protection is too expensive to implement properly without the latest hardware. In both cases, it is a political debate. Continue reading Data Protection: Implement before you Need It