Data Protection

Data Protection is much more than verifying that you have a valid backup. While the recovery of your data is important, Data Protection also encompasses data life cycle management, business continuity, disaster recovery, and continuous data protection as they pertain to virtualized and cloud environments. This topic also examines how to secure and monitor the passing of data between disparate environments and how to increase the scale of data to be protected in shorter periods of time. (Read More)

How to manage the security and protection of your environment in order to safeguard your crown jewels has always been important. However, it has never been more so than today, when data-breach announcements are common and everyone from nation-states to teenagers in their bedrooms have access to powerful tools for breaking in.

VirtualizationBackup

The End of an Era: The End of Backup Exec

VirtualizationBackup

It’s the end of an era: the end of Backup Exec. Symantec has released a notice that it will stop selling the Backup Exec 3600 appliance on January 5, 2015. When this topic caught my eye while I was reading the latest cloud computing news, I must admit the announcement brought on a feeling of nostalgia about the early days in my IT career. Backup Exec was one of the earliest products that I supported and became proficient with, and now, about twenty years later, this announcement brings on what I would call an end of an era in itself. I understand that the Backup Exec 3600 appliance is a completely different product than what I worked with in those early days, but let me ask you this. How many of you reading this post have worked with some version of Backup Exec throughout your career? I am willing to make a small wager that if you have a few years under your belt, and especially if you have been working in IT since sometime around the turn of the century, you have.

Read More

VirtualizationBackup

News: Veeam Enters Physical Backup Land

VirtualizationBackup

October 8, 2014: Today at the Las Vegas VeeamON conference, Veeam announced its first foray into the world of physical device backup. With the rather catchy name “Veeam Endpoint Backup Free,” the product, when it is released, will be able to back up a physical endpoint (read Windows-based operating system) to a NAS share or a Veeam backup repository.

Read More

VirtualizationBackup

What Do You Know about Asigra?

VirtualizationBackup

What do you know about Asigra? What if I told you there is a good chance that you have used its products but never knew it? During VMworld 2014 in San Francisco, I had the opportunity to sit in on a briefing from Asigra at the Tech Field Day Extra event. I had heard of Asigra before but could not have told you much about the company or its product offerings before this briefing. Asigra is a company that specializes in backup and recovery, and it has been doing so for over a quarter century.

Read More

VirtualizationBackup

Data-Aware Services: Oh, the Places We Could Go!

VirtualizationBackup

I have written many times about the need for application-centric data protection and data-centric security. But what these both require is that our data protection, security, management, and networking are data-aware. We use applications, but we thrive on data. The more data we have, the more chance we can make use of it, which has resulted in big data tools and big data extensions, even to hypervisors. We talk constantly about moving data closer to processing, with flash and other techniques at the storage layer. But we have not grown other aspects of our systems to be data-aware. It is time this changed.

Read More

VirtualizationBackup

Next-Generation Data Protection: Realities

VirtualizationBackup

In the past, I have written about the next generation of data protection, which combines analytics with broader data and holistic system protection into one easy-to-use product (or set of products). The goal is to take disaster recovery to the future, when we will be able to restore and test our restores of not just our data, but also the systems required to make that data accessible, including all networking and security constructs. If you were to have a massive disaster, could your disaster recovery techniques restore your entire environment at just a push of a button? Does your disaster recovery testing feed back into analytics to determine what needs to change to make this a reality? 

Read More