Today, everyone seems to understand the ever-growing importance of data protection, often viewing it as a superset of backup combined with snapshots and replication. Typically, a conversation about data protection includes the assumption of a “gold standard” centered on using secondary disk for rapid recovery and tertiary tape for long term retention. Of course, “the cloud” also is always a consideration as part of the next generation of the solution. It’s still all under the banner of “data protection” (DP), the collection of activities, methods, and media used to help recover or restore business information after a crisis or other IT disruption. According to research, primary storage is growing around 40% annually, with secondary storage used for data protection growing at similar rates. Budgets aren’t growing nearly that much. Meanwhile, IT organizations are being asked to do more (i.e., inject more agility, functionality, and resiliency into their operations) while spending as little budget money as possible. In actuality, data protection budgets are growing around 4.6% annually according to ESG research, but that level of increase won’t even let you keep doing what you have been doing at a larger scale.Therefore, you have to do something different. What you should do: ARCHIVE!
Yesterday was an exciting day for Quantum. We had the honor of ringing the Closing Bell® on the New York Stock Exchange to commemorate the 35th anniversary of the company’s founding. It was a great feeling to represent the entire Quantum team as we marked this significant milestone and looked forward to building on our rich heritage. The company has changed significantly over the years, but here are 4 areas that have remained constant.
Quantum's DXi6900 proudly received the Silver Award in Storage Magazine/SearchStorage.com's 2014 "Product of the Year Backup Hardware" category. This industry recognition comes just as industry analyst ESG released the results of their recent lab testing, validating DXi6900’s performance claims. Both the award and lab validation are a big deal for us and reinforce what we’ve already been hearing from our happy customers: DXi6900 is a high performance appliance that is very well suited to the needs of mid-size and enterprise-scale companies as well as managed service providers.
The cybersecurity headlines have gotten bigger, bolder, and more prevalent as 2014 draws to a close. Not surprisingly, as a result of these costly cyber incidents, there has been much discussion about how to prevent—how to detect—and how to prepare for cyber attacks, including my recent article in InformationWeek’s Wall Street & Technology: "5 Tips On How To Prepare For A Data Breach."
Since launching the DXi6900 in July, we’ve seen remarkable customer interest. That interest is one of the key drivers of the 11% year-over-year growth in DXi revenue we reported last quarter. Now another data point showing how the DXi6900 and the entire DXi family stacks up against other deduplicating backup appliances has just been published: Industry analyst DCIG issued their annual buyer’s guide and the DXi6900 earned a “recommended” rating, with just .45 points separating it from the top spot. In fact, DXi appliances took three of the top 6 spots in the list. So why is the DXi6900 getting so much attention? And how do DXi's deduplication solutions work for "real world" customers?
Deduplication is now widely recognized as a proven technology in the datacenter. In fact, it seems to be cropping up everywhere – from flash arrays to backup applications, and of course disk backup appliances. There’s no end in sight for structured and unstructured data growth, and with the proliferation of technology like deduplication, it is not unusual that the level of complexity increases, as does the challenge to keep it in check. A good first step is to recognize where deduplication can best be applied. Here are a few of the considerations.
Data protection strategies have been in a state of accelerated evolution over the last five years. I hear this confirmed regularly by customers describing their implementation stories with Quantum, as well as by the industry analysts that we meet with to discuss our latest product innovations. ESG’s Jason Buffington is one of those analysts that we talk with often, and it’s always interesting to see how ESG’s research squares against what we’re seeing in data centers. Jason’s latest video blog about modernizing data protection – 8 Suggestions for Every Data Protection Strategy – highlights ESG research that resonated with me in a number of respects.
As the volume of data has increased, there has been a shift in the way that companies use and access that data. That means it’s time to change the way you think about data protection, retention, and accessibility. Organizations of all sizes recognize that data can help gain competitive advantages and even support new revenue streams, but this is placing a demand on IT to store and preserve access to that data. Companies need new solutions and technologies to support unpredictable, on-demand access and incorporate new approaches to backup and archiving. It’s time to reTHINK Backup & Archive.
I was talking to an SMB customer this week, and he was raving about the benefits of deduplication. Deploying deduplication allowed him to completely rethink his data protection policies and reduce his management time. He’s in a smaller IT department where, as he said, “we have to wear many hats and don’t have the luxury of in-house specialists. It was so simple, no worries about backup windows, or any of those details that we used to regularly consider and tweak with the older backup system.” His statement got me thinking, the same type of change is happening with VM data protection. As noted in this previous blog from TeamQ, VM deployments are growing rapidly, but protecting VM data creates some unique challenges.
If you have questions about data protection for virtual machines, we invite you to download “VM Data Protection for Dummies, Quantum Special Edition.” This free e-book will help you identify your VM protection needs, ask the right questions of potential vendors, and choose the VM protection solution that’s right for your organization. The FAQ chapter covers 10 frequently asked questions about VM data protection, such as “How does VM backup work with deduplication appliances?” and “Do I have to choose between one of the new VM-only backup applications and my legacy backup software?”