Choosing the Right Deduplication Solution for Your Organization
|
|
- Donna Arnold
- 6 years ago
- Views:
Transcription
1 Choosing the Right Deduplication Solution for Your Organization Application-based deduplication versus appliance-based deduplication Introduction Due to the significant data growth and extended retention requirements organizations face today, almost every backup and recovery solution on the market now includes deduplication and compression capabilities. Together, deduplication and compression enable impressive savings, including reduced storage and network requirements, lower power and cooling loads, better recovery point objectives (RPOs) and recovery time objectives (RTOs), and shorter backup windows. Also, precious data center storage real estate becomes ~15 times more scalable, and organizations can effectively protect data generated at remote and branch offices by replicating deduplicated data to central locations using existing and often limited bandwidth. There are two popular approaches to implementing compression and deduplication capabilities in backup environments: Using deduplication and compression functionality that is integrated into backup software applications Using the deduplication and compression features of purposebuilt back-up-to-disk appliances (PBBAs) In most cases, there is no benefit to implementing more than one deduplication approach. But which of the two approaches is better for your organization? One might think that the first option would offer more benefits, since tight integration often offers efficiencies through use of shared technologies. In practice, however, choosing the right option is more complicated, because deduplication technology can have profound effects on multiple areas of the backup environment. This white paper explores the key areas of impact to help you make an informed decision about the best deduplication solution for your organization.
2 A common frustration with backup and recovery solutions is logjams at the media server. The two approaches to deduplication Let s begin with a quick overview of the two approaches to implementing deduplication: technologies are fast, scalable and extremely efficient. As backup data sets grow over time, the appliance s superior deduplication algorithms scale to extremely large data stores with millions of files. technology is less efficient and more limited. For example, many of these offerings implement a fixed block approach for deduplication, whereas appliances implement variable block size deduplication technology. Additionally, many software solutions are limited to smaller deduplication stores. When multiple deduplication stores are required, deduplication becomes less effective and savings diminish because deduplication does not span across deduplication stores. A complete picture of each option, though, extends far beyond these direct benefits and drawbacks. The rest of this paper explores how these deduplication technologies affect the broader backup environment, including resource contention, costs, flexibility, maintenance and risk. The media server A common frustration with backup and recovery solutions is logjams at the media server. As backup demands grow over time, the media server can become overtaxed by lack of resources, encounter networking issues when sending data to or receiving data from the protected client, or a combination of both. In particular, running multiple backup and restore tasks together in parallel can cause media server logjams to quickly appear. In fact, when a backup softwarebased deduplication approach is chosen, media server workloads are increased tenfold. This is because the media servers are additionally taxed with ingest deduplication (hashing), management of the deduplication dictionary database, rehydration of data to tape and replication workloads. In addition, client-based deduplication workloads may also be introduced on the media server. With software-based deduplication, the media server workload includes all of the following: Processing client backup data Ingest deduplication (hashing) Managing the deduplication dictionary Creating tape copies from disk Rehydration processing Replication Figure 1. increases the media server workload significantly. 2
3 Client 1 Client 2 Client 3 Client 100 Media server 1 Media server 3 Media server 5 Media server 2 Media server 4 Media server 6 Figure 2. With software-based deduplication, avoiding logjams requires adding more media servers, which increases costs and complexity. To avoid logjams, customers often add media servers equipped with greater CPU and memory resources (see Figure 2). While this approach spreads out the extra load, it also obviously increases complexity and costs. Because purpose-built backup to disk appliances absorb deduplication and replication workloads, current backup environments can remain unchanged. Complexity is avoided because there is no need to beef up the number and horsepower of media servers (see Figure 4). SAN or local storage 10 / 15K Purpose-built backup to disk appliances absorb deduplication and replication workloads, so the media server workload is limited to: Processing client backup data Creating tape copies from disk Figure 3. Appliance-based deduplication puts no extra load on the media server. With appliance-based deduplication, there is no need to beef up the number and horsepower of media servers. 3
4 Client 1 Client 2 Client 3 Client 100 Media server 1 Media server 2 Media server 3 Purpose-built deduplication appliances are built to simultaneously handle deduplication loads across multiple backup applications. Purpose-built backup-to-disk appliance Figure 4. does not put additional load on media servers. What if the backup environment is already equipped with bigger and faster media servers with no logjams? Does this diminish the value of appliancebased deduplication? Definitely not. In fact, if desired, purpose-built backup to disk appliances can offload the deduplication processing from the appliance to a number of media servers. If enough media server resources become engaged, the deduplication process for backups can become faster than the appliance itself. Costs Vendors of backup software deduplication and compression solutions tout significant costs savings when compared to dedicated appliances, pointing out that existing investments in SAN, NAS and DAS storage systems can be utilized to support backup storage needs. However, these vendors fail to include in their calculations the tenfold increase in media server workloads with software deduplication solutions and the resulting significant cost of spreading this additional workload across a greater number of media servers with big CPUs and memory to avoid logjams. In addition, meeting service level agreements (SLAs) often requires fast and therefore expensive solid state disk (SSD) drives be used for target repositories. These costs wash out the touted backup software deduplication and compression savings. Flexibility Each backup software application implements a proprietary approach to deduplication and compression. Thus, if an environment uses multiple backup software applications, two or more software-specific deduplication technologies are being implemented, which can make the environment more complex and difficult to manage. On the other hand, purpose-built deduplication appliances are not anchored to any specific backup software product they are built to simultaneously handle deduplication loads across multiple backup applications. This capability is extremely valuable to IT environments that use multiple backup products. Moreover, as updates or changes to backup software occur in the future, the deduplication appliance can continue to be used, maximizing the value of the investment. 4
5 Management and maintenance With purpose-built backup appliances, storage administration expertise is unnecessary because use of virtual storage entities abstracts management tasks such as creating LUNs, configuring RAID groups and mounting volumes. Appliance dictionary databases and all other components are pre-configured, making the appliance immediately ready for operation after a short deployment wizard is completed. Management is simple as well. The internal storage system is equipped with cost-effective, high-capacity hard drives, offering significantly denser target repositories for backup workloads than storage with software-based solutions. When appliances require additional storage, an expansion is quick and typically non-disruptive. Appliances will immediately begin to use the extra capacity without any need to tune LUNs or RAID groups or perform any other storage-related tasks. Deployment and management are not as simple for software-based deduplication solutions. CPU, memory and storage must be properly sized for each media server and because there are more servers, there is more to scope and manage. To ensure adequate performance, fast and expensive solid state disk drives dedicated to the deduplication database must be properly sized and configured into LUNS, RAID groups and so on, following vendor or company best practices or configuration guidelines which typically requires assistance from a storage specialist. Over time, deduplicated data will continue to grow. When maximum storage capacities are reached, a storage specialist will be required again to reconfigure disks and RAID groups and perform other storage-related tasks. Tolerance solutions piggyback the backup environment s media servers, which typically run well-known, full-blown operating systems. These operating systems are easy targets for viruses, worms and other malware so components such as the deduplication database are likely to experience unexpected hiccups and even outages, putting the organization at risk of data loss. And when corruption occurs, restoring the deduplication database is time-consuming. An appliance-based deduplication database is significantly less susceptible to corruption because its components run within a controlled, locked down operating environment. Every driver, service and component is well understood, and they are designed to work closely together as a complete solution, making it significantly more difficult for outside influences to cause corruption and also making the database significantly easier to recover. Rehydration In disk-to-disk-to-tape (D2D2T) backup environments, backups that are deduplicated and compressed on a disk are rehydrated to their native format and preserved on tape for longer term retention. Rehydration is a very long and resource-intensive task because unique deduplicated chunks of data are stitched back together to form the original backup. Because of this, backup softwarebased duplication solutions can be difficult to size for. While processing deduplication for backups, the media server will also be processing the rehydration of data, which can typically run 24x7. When aggressive recovery time objectives are required, beefing up the media server resources to meet these time windows can be quite costly. An appliance-based deduplication database is significantly less susceptible to corruption because its components run within a controlled, locked down operating environment. 5
6 Purpose-built deduplication and compression appliances offer an affordable, powerful and easy-to-use solution that can scale to handle growing data sets without rip-andreplace. Purpose-built backup appliances, on the other hand, absorb all rehydration workloads from D2D2T environment components, which make them much easier to size for. Conclusion Data sets and regulations are both growing rapidly, but IT staff size is not. Therefore, today s IT solutions must be simple to deploy and use, and must be able to scale to meet aggressive data growth. Deduplication and compression are first-rate technologies to manage growing data sets that require longer and longer retentions. When choosing deduplication technology, organization cannot afford to ignore the impact to their broader backup environments. Softwarebased deduplication solutions claim to be more cost-effective than their appliance-based counterparts, but these alleged savings disappear when you factor in the hidden costs of adding media servers with powerful CPUs and lots of memory, upgrading to expensive SSDs, hiring storage management expertise, and risking downtime and data loss. Moreover, purpose-built deduplication appliances deliver superior deduplication technology while reducing the complexity of backup administration and management. Purpose-built deduplication and compression appliances offer an affordable, powerful and easyto-use solution that can scale to handle growing data sets. They are designed to complement existing backup environments regardless of what backup software is being used, enabling compression and deduplication savings without rip-andreplace demands. Dell offers the DR Series of purposebuilt disk based deduplication and compression appliances that have a proven track record of satisfying customer backup needs. We invite you to learn more at software.dell.com/ solutions/deduplication-appliances. 6
7 For More Information 2015 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Dell, Inc. ( Dell ). Dell, Dell Software, the Dell Software logo and products as identified in this document are registered trademarks of Dell, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN DELL S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. About Dell Software Dell Software helps customers unlock greater potential through the power of technology delivering scalable, affordable and simple-to-use solutions that simplify IT and mitigate risk. The Dell Software portfolio addresses five key areas of customer needs: data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, drives unmatched efficiency and productivity to accelerate business results. If you have any questions regarding your potential use of this material, contact: Dell Software 5 Polaris Way Aliso Viejo, CA Refer to our Web site for regional and international office information. 7 WhitePaper-ChoosingDeduplication-US-KS-26295
How to Show Grouping in Scatterplots using Statistica
How to Show Grouping in Scatterplots using Statistica Written by Dell Software Introduction A scatterplot shows the relationship between continuous variables. Showing a grouping factor in the plot adds
More informationOptimize Your Databases Using Foglight for Oracle s Performance Investigator
Optimize Your Databases Using Foglight for Oracle s Performance Investigator Solve performance issues faster with deep SQL workload visibility and lock analytics Abstract Get all the information you need
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate
More informationSetting up the DR Series System on Acronis Backup & Recovery v11.5. Technical White Paper
Setting up the DR Series System on Acronis Backup & Recovery v11.5 Technical White Paper Quest Engineering November 2017 2017 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization
More informationSetting Up Quest QoreStor with Veeam Backup & Replication. Technical White Paper
Setting Up Quest QoreStor with Veeam Backup & Replication Technical White Paper Quest Engineering August 2018 2018 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES
More informationSetting up the DR Series System with vranger. Technical White Paper
Setting up the DR Series System with vranger Technical White Paper Quest Engineering November 2017 2017 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND
More informationQuest NetVault Backup Plug-in for NDMP. Application Notes for Dell FluidFS NAS Appliances. NCG x-EN-01 03/20/13
Quest NetVault Backup Plug-in for NDMP Application Notes for Dell FluidFS NAS Appliances NCG-120-2.x-EN-01 03/20/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information
More informationSetting up Quest QoreStor as an RDA Backup Target for NetVault Backup. Technical White Paper
Setting up Quest QoreStor as an RDA Backup Target for NetVault Backup Technical White Paper Quest Engineering June 2018 2018 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL
More informationQuest NetVault Backup Plug-in for SnapMirror To Tape. User s Guide. version 7.6. Version: Product Number: NTG EN-01 NTG
Quest NetVault Backup Plug-in for SnapMirror To Tape version 7.6 User s Guide Version: Product Number: NTG-101-7.6-EN-01 NTG-101-7.6-EN-01 09/30/11 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide
More informationA Rapid Recovery Technical Whitepaper. Lenovo Nutanix Data Protection: Best Practices for Quest Software Data Protection Solutions
A Rapid Recovery Technical Whitepaper Lenovo Nutanix Data Protection: Best Practices for Quest Software Data Protection Solutions 2017 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL
More informationTOAD TIPS & TRICKS. Written by Jeff Podlasek, Toad DB2 product manager, Quest
TOAD TIPS & TRICKS Written by Jeff Podlasek, Toad DB2 product manager, Quest Abstract Want to get the most from Toad? This technical brief will walk you through some of its most useful features. You ll
More informationZero impact database migration
Zero impact database migration How to avoid the most common pitfalls of migrating from Oracle to SQL Server. ABSTRACT Migrating data from one platform to another requires a lot of planning. Some traditional
More informationAbstract. Introduction
Four Steps Toward Planning a Successful Email Migration How MessageStats Can Help You Understand and Clean Up Your Source Environment to Simplify Your Move Written by Joel Blaiberg, Dell Software Abstract
More informationSetting Up Quest QoreStor as a Commvault Backup Target. Technical White Paper
Setting Up Quest QoreStor as a Commvault Backup Target Technical White Paper Quest Engineering August 2018 2018 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY,
More informationOne Identity Defender 5.9. Product Overview
One Identity 5.9 Product Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDell DocRetriever for SharePoint. User Guide 5.3.1
Dell DocRetriever for SharePoint 5.3.1 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
More informationMetalogix Intelligent Migration. Installation Guide
Metalogix Intelligent Migration Installation Guide 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDell SonicWALL SonicOS 5.9 Upgrade Guide
Dell SonicWALL Upgrade Guide April, 2015 This provides instructions for upgrading your Dell SonicWALL network security appliance to from a previous release. This guide also provides information about importing
More informationWindows 7 Migration: An industry view of application compatibility
Windows 7 Migration: An industry view of application compatibility Abstract In the two years that Windows 7 has been available to the enterprise, many organizations have made the move, and common challenges
More informationQuest Unified Communications Diagnostics Data Recorder User Guide
Quest Unified Communications Diagnostics 8.4.1 Data Recorder User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationOne Identity Quick Connect Express
One Identity Quick Connect Express for Active Directory 5.6.0 October 2017 These release notes provide information about the One Identity Quick Connect Express for Active Directory release. About New features
More informationvoptimizer Pro Version What s New
voptimizer Pro Version 3.1.1 What s New 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationOne Identity Starling Two-Factor Authentication. Administrator Guide
One Identity Authentication Administrator Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationSpotlight Management Pack for SCOM. User Guide
Spotlight Management Pack for SCOM 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationToad DevOps Toolkit 1.0
Toad DevOps Toolkit 1.0 Release Notes 9/29/2017 These release notes provide information about the Toad DevOps Toolkit release. About Toad DevOps Toolkit Toad DevOps Toolkit exposes key Toad for Oracle
More informationOne Identity Password Manager User Guide
One Identity Password Manager 5.8.2 User Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationLiteSpeed for SQL Server 6.1. Configure Log Shipping
LiteSpeed for SQL Server 6.1 Configure Log Shipping 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationOne Identity Starling Two-Factor Authentication. Administration Guide
One Identity Starling Two-Factor Authentication Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationQuest Migration Manager Upgrade Guide
Quest Migration Manager 8.14 Upgrade Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationOne Identity Active Roles Diagnostic Tools 1.2.0
1 One Identity Active Roles Diagnostic Tools 1.2.0 Release Notes October 2017 These release notes provide information about the One Identity Active Roles Diagnostic Tools release. About One Identity Active
More informationCloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud
Cloud Access Manager 8.1.3 How to Deploy Cloud Access Manager in Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationAuthentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide
Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationOne Identity Active Roles 7.2
One Identity December 2017 This document provides information about the Active Roles Add_on Manager7.2. About Active Roles Add_on Manager New features Known issues System requirements Getting started with
More informationEnabling Agile Database Development with Toad
Enabling Agile Database Development with Toad Eliminate the bottleneck in your agile process with Toad Development Suite for Oracle and Toad Intelligence Central INTRODUCTION The challenges of agile methodology
More informationRapid Recovery DocRetriever for SharePoint User Guide
Rapid Recovery 6.1.3 Table of Contents Introduction to DocRetriever for SharePoint... 6 Using this documentation... 6 About DocRetriever for SharePoint...7 DocRetriever, AppAssure, and Rapid Recovery compatibility...
More informationQuest Migration Manager for Exchange Resource Kit User Guide
Quest Migration Manager for Exchange 8.14 Resource Kit User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationToad Edge 2.0 Preview
Toad Edge 2.0 Preview March 2018 These release notes provide information about the Toad Edge release. About Toad Edge 2.0 Preview New features of Toad Edge Known issues System requirements Getting started
More informationDell DR4000 Replication Overview
Dell DR4000 Replication Overview Contents Introduction... 1 Challenges with Data Disaster Recovery... 1 The Dell DR4000 Solution A Replication Overview... 2 Advantages of using DR4000 replication for disaster
More information1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE
1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDell Change Auditor 6.5. Event Reference Guide
Dell Change Auditor 6.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationQuest InTrust InTrust Events
Quest InTrust 11.3 InTrust Events 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationCloud Access Manager SonicWALL Integration Overview
Cloud Access Manager 8.1.3 SonicWALL Integration Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDe-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid
De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)
More informationOne Identity Active Roles 7.2. Management Pack Technical Description
One Identity Active Roles 7.2 Management Pack Technical Description Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationQuest One Password Manager
Quest One Password Manager Version 5.5 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationVirtual Disaster Recovery
The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...
More informationMetalogix Archive Manager for Files 8.0. IIS Installation
Metalogix Archive Manager for Files 8.0 IIS Installation 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationManagement Console for SharePoint
Management Console for SharePoint User Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described
More informationHyper-converged Secondary Storage for Backup with Deduplication Q & A. The impact of data deduplication on the backup process
Hyper-converged Secondary Storage for Backup with Deduplication Q & A The impact of data deduplication on the backup process Table of Contents Introduction... 3 What is data deduplication?... 3 Is all
More informationQuest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2013 Migration
Quest Migration Manager for Exchange 8.14 Granular Account s for 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationOne Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide
One Identity Adapter 6.0 Administrator Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationQuest InTrust Objects Created and Used by InTrust
Quest InTrust 11.3 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationQuest Migrator for Notes to Exchange SSDM User Guide
Quest Migrator for Notes to Exchange 4.15.0 SSDM User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationOne Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface
One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationBusiness Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection
Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,
More informationKACE GO Mobile App 5.0. Getting Started Guide
KACE GO Mobile App 5.0 Getting Started Guide Table of Contents Using the KACE GO Mobile App...3 Getting Started...3 What features are included in this version of the KACE GO Mobile App?...3 How do I access
More information10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control
10 ways to securely optimize your network Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control Table of Contents Secure network optimization 3 #1. Application
More information4.0. Resynchronizing Public Folders, Mailboxes, and Calendars
4.0 Resynchronizing Public Folders, Mailboxes, and Calendars Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The
More informationAbout Toad for Oracle 2017 Editions 2. Product release notes 4. Installation 5
Revised 5/26/2017 Contents About 2 Product release notes 4 Installation 5 System requirements 6 Hardware requirements 6 Database requirements 7 Network 8 Additional requirements 8 Virtualization support
More informationSpotlight on SQL Server Enterprise Spotlight Management Pack for SCOM
Spotlight on SQL Server Enterprise 11.7.1 Spotlight Management Pack for SCOM Copyright 2016 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationQuest Recovery Manager for Active Directory Forest Edition 9.0. Quick Start Guide
Quest Recovery Manager for Active Directory Forest Edition 9.0 Quick Start Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The
More informationThe Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide
The Privileged Appliance and Modules (TPAM) 1.0 Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationOne Identity Starling Two-Factor Desktop Login 1.0. Administration Guide
One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationToad Edge Installation Guide
Toad Edge 1.1.0 Installation Guide Copyright Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationSQL Optimizer for IBM DB2 LUW 4.3.1
SQL Optimizer for IBM DB2 LUW 4.3.1 Monday, April 24, 2017 About SQL Optimizer for IBM DB2 LUW SQL Optimizer for IBM DB2 LUW maximizes SQL performance by automating the manual, time-intensive and uncertain
More informationDell Secure Mobile Access Connect Tunnel Service User Guide
Dell Secure Mobile Access 11.4 Connect Tunnel Service 2016 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationQuest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2010 Migration
Quest Migration Manager for Exchange 8.14 Granular Account s for 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationQuest ChangeAuditor 5.1 FOR LDAP. User Guide
Quest ChangeAuditor FOR LDAP 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this
More informationSPListX for SharePoint Installation Guide
SPListX for SharePoint Installation Guide Product Description... 2 System Requirements and Recommendations... 3 Upgrade to the latest version of SPListX for SharePoint... 11 1 Product Description SPListX
More informationAT60142H/HT. Rad-Hard 512Kx8 Very Low Power CMOS SRAM ERRATA-SHEET. Active Errata List. Errata History. Abbreviations. 1.
AT60142H/HT Rad-Hard 512Kx8 Very Low Power CMOS SRAM ERRATA-SHEET Active Errata List 1. Reading Error Errata History Lot Number Errata List All AT60142H lots 1 All AT60142HT lots 1 Abbreviations ATE :
More informationToad Intelligence Central 3.3 New in This Release
Toad Intelligence Central 3.3 New in This Release Tuesday, March 28, 2017 This release of Toad Intelligence Central includes the following new features and enhancements. Toad Data Point Enter Variable
More informationDell Statistica. Statistica Enterprise Server Installation Instructions
Dell Statistica Statistica Enterprise Server Installation Instructions 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationToad Data Point - Professional Edition. The Toad Data Point Professional edition includes the following new features and enhancements.
Toad Data Point Version 3.4 New in This Release November 08, 2013 Contents Toad Data Point - Professional Edition Toad Data Point - Base and Professional Editions Idea Pond Toad Data Point - Professional
More informationQuest Code Tester for Oracle 3.1. Installation and Configuration Guide
Quest Code Tester for Oracle 3.1 Installation and Configuration Guide Contents Introduction to this Guide 3 Installation and Administration of Code Tester for Oracle 4 System Requirements 5 Test Repository
More informationKACE GO Mobile App 4.0. Release Notes
KACE GO Mobile App 4.0 Release Notes Table of Contents Quest KACE GO 4.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...
More informationDeduplication: The hidden truth and what it may be costing you
Deduplication: The hidden truth and what it may be costing you Not all deduplication technologies are created equal. See why choosing the right one can save storage space by up to a factor of 10. By Adrian
More informationOne Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide
One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationMySonicWall Secure Upgrade Plus
June 2017 This guide describes how to upgrade a SonicWall or competitor appliance in MySonicWall using the Secure Upgrade Plus feature. Topics: About Secure Upgrade Plus Using Secure Upgrade Plus About
More informationHYCU and ExaGrid Hyper-converged Backup for Nutanix
HYCU and ExaGrid Hyper-converged Backup for Nutanix Backing Up and Recovering Data: Nutanix, ExaGrid and HYCU As IT data centers move to hyper-converged infrastructure, new and innovative backup approaches
More informationQuest Enterprise Reporter 2.0 Report Manager USER GUIDE
Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationEAM Portal User's Guide
EAM Portal 9.0.2 User's Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationQuest vworkspace. What s New. Version 7.5
Quest vworkspace What s New Version 7.5 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright. The software described in this
More informationAuthentication Manager Self Service Password Request Administrator s Guide
Authentication Manager Self Service Password Request 9.0.2 Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationRapid Recovery License Portal Version User Guide
Rapid Recovery License Portal Version 6.1.0 User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationEMC Integrated Infrastructure for VMware. Business Continuity
EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.
More informationMetalogix StoragePoint 5.7. Release Notes
Metalogix StoragePoint 5.7 Release Notes 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationOne Identity Active Roles 7.2. Configuration Transfer Wizard Administrator Guide
One Identity Active Roles 7.2 Configuration Transfer Wizard Administrator Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationQuest Recovery Manager for Active Directory 9.0. Quick Start Guide
Quest Recovery Manager for Active Directory 9.0 Quick Start Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationKACE GO Mobile App 5.0. Release Notes
KACE GO Mobile App 5.0 Release Notes Table of Contents Quest KACE GO 5.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...
More informationDell SonicWALL Security 8.1.1
Dell SonicWALL July 2015, updated October 2015 These release notes provide information about the Dell SonicWALL release. About Supported platforms New features Resolved issues Product licensing Upgrading
More informationCloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0
Cloud Access Manager 8.1.3 How to Configure for SSO to SAP Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationOne Identity Starling Two-Factor HTTP Module 2.1. Administration Guide
One Identity Starling Two-Factor HTTP Module 2.1 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationQuest Collaboration Services 3.6. Installation Guide
Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationSQL Optimizer for Oracle Installation Guide
SQL Optimizer for Oracle 9.2.2 Installation Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationOne Identity Manager Administration Guide for Connecting to SharePoint
One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More information