Articles Tagged with Zerto

Virtualizing Business Critical Applications: Data Protection

A major aspect of virtualizing any business critical application is data protection which encompasses not only backup, but disaster recovery, and business continuity. It is imperative that our data be protected. While this is true of all workloads, it becomes a bigger concern when virtualizing business critical applications. Not only do we need backups, but we need to protect the business, which is where business continuity comes into play.

Read More

Datasores: Where are yours?

A typo report on twitter has lead me to a set of thoughts with respect to data. Where are your Datasores? What is a datasore? Unlike a Data Store which holds data, a datasore is a place where data becomes either painful to manage or protect. Or where the data exceeds your capability to handle it. A data sore should never happen, but with the explosion of data being moved, protected, managed, and mined we have exceeded certain limits of our existing set of tools. How do we find data sores and alleviate them? Does alleviating them require us to re-architect our entire data usage and storage mechanisms?

Read More

Move to the Cloud: Wait Out the Storm

The east coast is experiencing the tail end of a very large storm named ‘Sandy’. We all had plenty of time to prepare for the storm, but did we? Individually, we probably did, but what about our data? Those 24/7 critical processes to allow our customers to view and respond to the data our organizations provide? We were lucky—we had no issues during the storm, but now we await issues during storm clean up. So how do you prepare for such disasters? Do you move to the cloud?

Read More

New Breed of Replication Receiver Clouds

There is an ever-increasing number of data protection providers creating replication receiver clouds as they team up with cloud service providers. This could herald the end of on-premise tape use for some enterprises, leaving tape to be used primarily by cloud providers. There are major benefits for Quantum, Zerto, Veeam, and others to form replication receiver clouds, but these clouds are not just for storage anymore. They could be purely for storage, but this is not a big win for the cloud service providers. So why would cloud service providers be interested in being a storage endpoint for data protection? Why are they concerned with backup and offering it as a service?

Read More

Tenant and Multi-Tenant Security: It’s All About Scope

While at InfoSec World 2012’s summit on Cloud and Virtualization Security, the first talk was on Securing your data. The second was on penetration testing to ensure that data was secure.  In essence it has always been about the data but there is a huge difference between what a tenant can do  and what the cloud or virtual environment provider can do with respect to data protection and security. This gap is apparently becoming wider instead of smaller as we try to understand tenant vs cloud provider security scopes. There is a lack of transparency with respect to security, but at the same time there are movements to gain that transparency. But secret sauces, scopes, legislation, and lack of knowledge seem to be getting in the way.

Read More