LiteSpeed for SQL Server
Nine Steps to Building a Business Oriented Disaster Recovery Plan
Data Protection Beta Programs
Protect petabytes of data across diverse IT environments. Built-in scalability enables you to manage resources for a diverse and growing collection of physical and virtual platforms. Back up data to disk and tape or maximize storage efficiency with optional deduplication capabilities. By combining advanced functionality with exceptional ease of use, you get robust enterprise backup and recovery — not to mention reduced complexity.
Ensure continuous and integrated data protection for your organization’s most relied-upon applications. Dell data protection solutions offer deep application-level support for critical applications such as VMware, Microsoft SQL Server, Exchange, SharePoint, Active Directory and Oracle.
How one company known for thwarting cyber attacks made improvements to protect its own data.
Imagine a company that thwarts millions of cyber attacks for clients all over the world only to discover that its own digital property and reputation are at risk.
In our e-book, you’ll learn about how ISCI found itself facing a potential Achilles’ heel: Almost all of its intellectual property consists of digital assets, and backup turmoil was creating the threat of data loss. A wrong data protection strategy can set in motion the reversal from good fortune to bad — and mess with your organization’s integrity.
ISCI is a company with 150 patents. It knows how to detect the presence of sophisticated adversaries hiding inside enterprise networks; it also has a product line addressing some of the toughest security challenges an organization can face, including the user-identity, 8th or "human layer" in network protocol.
To make the most of these achievements, and capitalize on its victories in the global battle for cyber security, ISCI needed to face down data protection challenges on the home front: to eliminate the risk of losing data required for product development and financial auditing.
Last but not least, it had to prevent a loss of confidence in IT.
Trial by full recovery
ISC8 launched a new data protection strategy that deployed a mix of data protection solutions: a Dell DR series backup-to-disk deduplication appliance and NetVault Backup software. The two are tightly integrated to deliver automated backups and granular recovery. The new solution was subjected to a “trial by full recovery” — by copying 8 terabytes off of a server, executing a full recovery and undertaking a bit-wise comparison. The result: The full 8 terabytes were bit perfect.
By leveraging the right data protection solution, ISC8 was able to:
Data threats can be avoided
ISCI surmounted its data protection challenges and has ejected a worst-case scenario — an irreversible loss of proprietary data — from the realm of the possible. That alone represents a substantial return on its investment in a new data protection strategy.
There are other aspects of data protection ROI that we’ll be blogging about — accelerating recovery, gaining IT staff time, reducing storage costs — but they all hinge on avoiding data loss.
Companies, like heroes, are rarely perfect. But when best efforts are put forward, potential data protection threats can be avoided.
Read our e-book or more examples of how organizations like yours are protecting against data threats, and increasing their return on investment from data protection.
About James Gomez
James is a marketing content strategist for Dell Software's marketing organization.
View all posts by James Gomez |
The mature and stable backup market has seen an influx of innovative technologies over the past few years and organizations can now choose a mix of backup technologies that are just right for them. Backup-to-tape is slowly being phased out and replaced with disk-based backup targets, and backup appliances and cloud services are also being added to the mix.
IDC's recent survey of storage managers shows that 30% of European organizations are already using backup-as-a-service and that a further 43% are planning to add cloud services to their mix of backup technologies in the next 12 months.
With so many options to choose from, it can be a challenge to design a future-proof backup strategy. Here are three key points to consider when choosing your next backup solution:
Ultimately, your new backup solution should give you the flexibility to take advantage of any backup technology that you want to deploy, and leverage the benefits of cloud if you want to use cloud services or, if you are not already using cloud services, provide the option to do so in the future, when the time is right for your organization.
If you would like to learn more about the characteristics of a future-proof backup strategy, download our complimentary white paper, “Choosing the Right Public Cloud for Better Data Protection”.
About Carla Arend
Carla Arend is a program director with the European software and infrastructure research team, responsible for managing the European storage research and co-leading IDC's European cloud research practice. Arend provides industry clients with key insight into market dynamics, vendor activities, and end-user trends in the European storage market, including hardware, software and services. As part of her research, she covers topics such as software-defined storage, OpenStack, flash, cloud storage, and data protection, among others..
View all posts by Carla Arend |
Here’s how to prevent it from re-living the same day over and over.
“What if there was no tomorrow? There wasn’t one today.”
OK, campers, rise and shine, and don’t forget your booties ‘cause it’s cooooold out there today. Especially cold, but the question on everybody’s (chapped) lips: Do ya think Phil is gonna come out and see his shadow?
DJ#1: That's right, woodchuck-chuckers — it's... GROUNDHOG DAY!
If you’re responsible for your firm’s data protection, you know the drill. You wake up every day, jumping right into your serial habits: stretch, scratch, shuffle to the bathroom, mentally scroll through all of the do-or-die things on your list … and head into the office for another day. Today, you’ll stay below radar, though. It *** getting your head ripped off when one little thing goes wrong and yet no one is ready to hand out “good-game” slaps when things are fine.
Phil: It's gonna be cold, it's gonna be grey, and it's gonna last you for the rest of your life.
You find yourself in a random business-review meeting when your CTO turns to you and asks, “Can we get our website, Exchange and SharePoint up in minutes after an event? I’m hearing from Sales it took a full day last year and our new mobile roll-out requires continuous access.”
Jeez. This guy doesn’t get it. Doesn’t he know you’re already working longer hours to cover the two guys you couldn’t hire last year? Doesn’t he understand that to get this done you’ll need a few extra pairs of arms and legs … and a unicorn?
Phil: Do you ever have déjà vu, Mrs. Lancaster?
Mrs. Lancaster: I don't think so, but I could check with the kitchen.
The real question is this: will you see your shadow and force an endless amount of even more reward-less stress … or is it time for a change? A time to move beyond the backup and recovery kit you inherited and start building an always-on environment?
It’s completely up to you. I mean, you’re the guy in the thick of it every day. As long as things keep running, everyone thinks you’re doing ok. But how is reliving the same day over and over working out for you, Phil? It’s going to take more than a slap-in-the-face montage to change things. You’ve got to change how you think about data protection.
Rita: This day was perfect. You couldn't have planned a day like this.
Phil: Well, you can. It just takes an awful lot of work.
It’s possible to access backup data as if it was live data. It’s possible to instantly get back to business after an outage, even in the cloud. It’s possible to never risk more than 5 minutes of data loss … oh, and protect everything in your environment instead of picking and choosing (and hoping no one finds out).
Of course you inherited some of your backup infrastructure. That doesn’t mean you’re stuck with it or that you even have to fully replace it to realize all of those possibilities. You’ve got to figure out a smarter way to work since no one is going to hand you a bigger bag of time (or money) any time soon.
Phil: It's so beautiful! Let's live here. We'll rent, to start.
Take it slow and start investigating today. Start by taking a peek at how other companies got their data protection programs out of seemingly-endless recurring cycles. Does your protection environment match your production environment? Are you treating all backup jobs the same even though all of your data is not? Can you guarantee a successfully recovery of everything you’ve already backed up?
It’s never too late to take a look. One day, you could wake up and say, “You know what today is? Today is tomorrow … it happened!”