Executive Summary. Methodology:
|
|
- Tamsyn Bates
- 6 years ago
- Views:
Transcription
1 Executive Summary The Data Archiving product/technology evaluation team began meeting in September 2014 and concluded work in March The team met approximately seven times during that period and compiled a selection of solutions currently in use at the University and reached a common understanding of what was in scope for this particular evaluation. The team then worked together to define a set of requirements and prioritized them according to the needs that were shared across multiple schools and centers. That list of requirements was sent to five vendors that represent the technical leaders in this discipline according to the 2014 Gartner Magic Quadrant for Enterprise Information Archiving, as the basis for a request for information (RFI). Based on the RFI results, four vendors CommVault, Global Relay, Hewlett- Packard, and Symantec were selected to come in for product demonstrations. After meeting all the vendors and reviewing available information, the team has determined that a campus solution is a viable option and that three of the vendors (CommVault, Hewlett- Packard, and Symantec) are potentially suitable options. In addition, due to a consolidation of all the ISC backup services on IBM technology, we believe that the IBM option should be considered as well. Each of these four options would require a more thorough vetting against the assembled requirements before a final vendor could be selected. Methodology: Data Archiving Defined In the first meeting, the team agreed that for the purposes of this study, we would be considering primarily unstructured data with the possibility that certain application data (SharePoint, Exchange, and others) could be considered as secondary requirements. The data archiving tools we were primarily considering were ones that could take less frequently used data and move it to slower and less expensive storage devices. The preference was for the data to be nearline, meaning it is easily accessed from the primary system, and not a completely separate and searchable data store. Page 1 of 6
2 Identified Requirements The team assembled a very large list of requirements that covered the needs of each School and Center. The requirements fell into the general categories of: Functional Capabilities Technical Requirements Interoperability Compatibility Support Compliance and Security Requirements were then prioritized by each team member and used to weigh the responses provided by vendors. Areas of particular concern for team members were compliance with HIPAA and FERPA as well as authentication methods that can natively integrate with systems we already have in use on campus. Vendor Evaluations: Commvault: CommVault Simpana is a full data protection system designed and built from the ground up. Archiving has become a strategic offering in the product which enables customers to meet backup windows, lower costs, and take control of data retention and governance policies. Simpana is installed on- premise on the customer's choice of server hardware. The CommServe component requires Microsoft Windows to run SQL server, but the Media Agents (data moving servers) can run Windows or Linux operating systems. There is wide support for major tape library vendors and many storage vendors have specific Intellisnap support for easy backup using native snapshotting. Cloud libraries can be configured as a target for backup and archive storage. Archiving is enabled at the client level in the CommServe interface, and is further configurable at the subclient level, which is the method used to specify what content will be backed up on a given client. Transparent recovery of archived files is achieved through stubs: pointers left in place of the original file that is moved off of the server. The OnePass technology used in Simpana for Archiving performs synthetic fulls of archive data. Rules can be set at the subclient level which can archive based on age of files, file size, last access time, user/group ownership, or disk capacity. Retention for archived files is also configurable to meet compliance requirements. The product offers advanced Page 2 of 6
3 content indexing which, in the context of archiving, will show end users thumbnail previews of files that in many cases eliminate the need to recover. The Data Archiving Evaluation team identified a need for e- mail archiving, which is supported on Simpana for Microsoft Exchange and IBM Domino. archiving is integrated with advanced discovery and legal hold features with the purchase of an additional licensing add- on. Journaling of all e- mail messages for compliance is possible. In the case of Exchange, archived e- mail messages are easily retrievable by users and administrators via an Outlook plugin. Import of Microsoft PST files is natively supported. Simpana features several other highly desired capabilities as polled by the Evaluation team. CommVault's patented binary- block deduplication technology claims to offer significantly more space savings than normal single- instance storage. An analytics tool is provided which can scan servers to determine which data is best suited for archiving in preparation for a migration. Security is ensured through heterogeneous encryption configurable as multiple types and strengths that can be set on data in transit and at rest. For more information, please visit: software Global Relay: Of all the vendors that we reviewed, Global Relay had the most unique set of characteristics. Like all of the other vendors considered they were in the Leaders section on the Gartner 2014 Magic Quadrant for Enterprise Information Archiving and rated high in all measures. However, there were some significant differences in terms of product capabilities and deployment options that we needed to consider. The most significant differentiator for Global Relay is that their offering is entirely centered on messaging and social media archiving with a particular focus on compliance requirements. During their presentation to our evaluation team they did indicate that there were some techniques we could use to incorporate file archiving into their product but the functionality is not there natively and would require some additional work on our part to get it working properly. Once the data is archived, it is both indexed and searchable. One attractive feature of Global Relay was their e- discovery feature. Unlike other products we reviewed, the e- discovery option is integrated into the base offering and does not incur additional licensing cost. Global Relay is also particularly focused on compliance issues and have robust capabilities in that space. Page 3 of 6
4 Global Relay is only available as a cloud- based software- as- a- service (SaaS) offering and cannot be deployed on- site at Penn. The SaaS capabilities were very attractive to some members of the review committee in that it would not require a large up- front investment in hardware and could be consumed incrementally. For others who wanted greater control of their data, the lack of a local hosting option was a potential negative but the model that would allow us to pay only for what we were consuming was universally attractive. While there are some very attractive features and functionality available in Global Relay, the lack of straightforward file archiving makes it incompatible with the requirements determined by the team. If a particular School or Center were looking for messaging platform archiving for compliance purposes, Global Relay would be a very attractive option for that use case. However, at this time we cannot recommend that Global Relay be pursued for a campus deployment of data archiving. For more information, please see: Hewlett- Packard: Hewlett- Packard s purchase of Autonomy in 2011 was a topic of controversy in the technology media, but even with that in mind, HP was positioned as a 2014 leader in the Archiving space according to Gartner. We invited HP to present the hosted Digital Safe product and saw that Autonomy's technology was integrated into a full- featured suite that met the high priority requirements established by the evaluation team. Our team identified the requirement for a hardware- agnostic back- end, which Digital Safe fulfills in that it is a hosted solution that does not reside on premise in a data center and therefore no server, storage, or tape hardware is needed. The cloud- based model obviates other traditional archiving concepts. Tiering lesser- used archived data to cheaper storage is managed transparently in the SaaS infrastructure. "Stubbing" of archived files is replaced by full end- user access to all data via a web browser. A key component of an archive strategy is the ability to automatically scan and report on what data is eligible to archive for greatest efficiency. HP ControlPoint ( point) will perform this important analysis for a first- time movement of data to an archive, and can be used for ongoing management of data. An immutable archive of the data and any associated metadata is ensured, as Digital Safe resides on a fully compliant Write One, Read Many (WORM) storage architecture. We were assured that all customers are allocated separate data storage that is not co- Page 4 of 6
5 mingled with other customers for truly secure multi- tenancy. The two geographically dispersed datacenter locations where customer data is housed are SOC 2 certified and the product is governed end to end by ISO 27001/27002 standards. Robust file index and search is enabled via Intelligent Data Operating Layer (IDOL) and is one of the key Autonomy technologies acquired by HP in the purchase. IDOL offers conceptual and contextual search capabilities. One thousand file types and formats can be searched and indexed by the engine and over one hundred languages are supported. The HP ediscovery portion of the suite is licensed separately at an additional cost. It allows for advanced search of the indexed archive data and the ability to put e- mails and files on legal hold. From a compliance standpoint, e- mail can be journaled as it arrives or leaves so that no information is lost, even if messages are later deleted. The newer challenge of managing user footprints left on IM and social media that could potentially be the source of costly legal discovery is addressed by the indexing features of Digital Safe and search in the ediscovery product. Because of the diverse variety of products offered in HP's portfolio, as well as the varying needs between the Schools and Centers at the University, HP recommended separate professional services engagements to determine the range of requirements and custom fit the service offerings. An HP professional services migration team would also be instrumental in implementation of the archiving solutions chosen. For more information, please see: safe Symantec: Symantec's Enterprise Vault (EV) suite of products supports all of the must- have features determined by the Data Archiving Evaluation team. We focused on the on- premise version of Enterprise Vault, though there also is an offering called EV.cloud that provides hosted archiving- as- a- service. The Vault Store on the back- end supports the most popular modern storage and tape library options, avoiding lock- in to a particular hardware vendor or appliance. A highly- desired supported feature is the ability to tier less frequently- accessed data to cheaper storage. In addition, cloud storage can be presented as a target. When a file is moved off of primary storage, it is replaced with a stub and can be recalled by the end user. All file types can be archived with Enterprise Vault, as well as application- aware archiving of Microsoft SharePoint and Exchange. The product is administered via a Microsoft Management Console (MMC) in which Page 5 of 6
6 policies are applied to users and also to specify the behavior of how a given data type will be archived. There is a dependency on Active Directory, and Groups, LDAP queries, or OU membership can be used to define how policies target users. Vault Cache can be offered to users, which gives a local, offline cache of archived items for fast recovery. Vault Cache can be accessed interactively by using the Virtual Vault Outlook add- in. Users can archive items manually by dragging into the Virtual Vault, and restore items to the Inbox by dragging out. The Symantec ediscovery Platform powered by Clearwell ( platform/) is separately licensed. It provides the ability to search archived files and e- mail messages. After which, these can be placed on legal hold, assigned to a team reviewers, and tagged or annotated. For more information, visit: vault/ Page 6 of 6
Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration
Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules
More informationChapter 2 CommVault Data Management Concepts
Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and
More informationEnterprise Vault Overview Nedeljko Štefančić
Enterprise Vault Overview Nedeljko Štefančić 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered
More informationOverview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving
EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury
More informationEvaluator Group Inc. Executive Editor: Randy Kerns
Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright
More informationThe Ultimate Guide for Virtual Server Protection
The Ultimate Guide for Virtual Server Protection 4 QUESTIONS EVERYONE SHOULD ASK ABOUT VIRTUAL SERVER DATA PROTECTION IT leadership should be looking to storage and data management teams to ensure they
More informationSimplify Backups. Dell PowerVault DL2000 Family
Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can
More informationChapter 10 Protecting Virtual Environments
Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they
More informationArchive 7.0 for File Systems and NAS
DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Archive 7.0 for File Systems and NAS Optimize Storage Resources, Automate Data Management and Improve Operational Efficiencies Key u Expand
More informationCommvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY
Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault
More informationHPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault
HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault Solution overview and best practices for data preservation with Veritas Enterprise Vault Technical white paper Technical
More informationTHE LITTLE RED BRIEF. ArchiVing And backup strategies. Your answer to the latest and greatest issues facing IT. VOL
THE LITTLE RED BRIEF Your answer to the latest and greatest issues facing IT. VOL 03 ArchiVing And backup strategies BusInEss continuity nothing lasts forever. unless no one ever deletes it. cdw.com/business-continuity
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationAdministration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177
Administration GUIDE OnePass Agent for Exchange Mailbox Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 User Guide - One Pass Agent for Exchange Mailbox Table of Contents Overview Introduction
More informationEXAM Administration of Symantec Enterprise Vault 10.0 for Exchange. Buy Full Product.
Symantec EXAM - 250-310 Administration of Symantec Enterprise Vault 10.0 for Exchange Buy Full Product http://www.examskey.com/250-310.html Examskey Symantec 250-310 exam demo product is here for you to
More informationOptimizing and Managing File Storage in Windows Environments
Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)
More informationArchiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention
Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.
More informationThe Nasuni Security Model
White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance
More informationDell PowerVault DL2100 Powered by CommVault
Dell PowerVault DL2100 Powered by CommVault A Dell White Paper CENTRALIZED DATA MANAGEMENT FOR REMOTE AND BRANCH OFFICE (ROBO) ENVIRONMENTS CONTENTS EXECUTIVE SUMMARY 3 RETURN ON INVESTMENT OF CENTRALIZING
More informationChapter 9 Protecting Client Data
Chapter 9 Protecting Client Data 152 - Protecting Client Data A client is defined as any production source requiring protection. A server with any Simpana idataagent installed in it is considered a client
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationTransforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide
Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Bob Crews President Checkpoint
More information-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection
INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap
More informationChapter 11. SnapProtect Technology
Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting
More informationRansomware & Modern DR: Risky Business
Ransomware & Modern DR: Risky Business Matt Tyrer: Manager, Solutions Marketing - Americas 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED. Agenda New-ish Risks New Answers to Old-ish Problems Old Problems
More informationCommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems Reliable Data Protection for Exchange Systems and their Environments
More informationChapter 12 Compliance, Records Management & ediscovery
Chapter 12 Compliance, Records Management & ediscovery 240 - Compliance, Records Management & ediscovery Compliance requirements in many organizations are forcing IT to readdress and redesign much of its
More informationIntermedia s Private Cloud Exchange
Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading
More informationPRODUCT BROCHURE Mailbox Shuttle and Archive Shuttle:
PRODUCT BROCHURE Mailbox Shuttle and Archive Shuttle: Seamlessly migrate email and archives. Email is a mission-critical service, so it s important that when you migrate your live mail the solution you
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationDocAve 6 Software Platform Service Pack 1
DocAve 6 Software Platform Service Pack 1 Release Notes For Microsoft SharePoint Release Date: September 25, 2012 1 New Features and Improvements General The new Plan Groups feature helps organize and
More informationACCURATE STUDY GUIDES, HIGH PASSING RATE! Question & Answer. Dump Step. provides update free of charge in one year!
DUMP STEP Question & Answer ACCURATE STUDY GUIDES, HIGH PASSING RATE! Dump Step provides update free of charge in one year! http://www.dumpstep.com Exam : 250-310 Title : Administration of Symantec Enterprise
More informationBraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!
BraindumpsIT BraindumpsIT - IT Certification Company provides Braindumps pdf! Exam : 250-308 Title : Administration of Symantec Enterprise Vault 8.0 for Exchange Vendors : Symantec Version : DEMO Get Latest
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationThe Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION
The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION The future of storage is flash The all-flash datacenter is a viable alternative You ve heard it
More informationMailbox Management with Symantec Enterprise Vault.cloud
WHITE PAPER: MAILBOX MANAGEMENT WITH SYMANTEC ENTERPRISE............ VAULT.CLOUD............. UPDATE............... Mailbox Management with Symantec Enterprise Vault.cloud Who should read this paper This
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com DRAFT W H I T E P A P E R A M o r e H o l i s t i c A p p r o a c h t o P r o t e c t i n g, M a n
More informationAdministration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225
Administration GUIDE Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 User Guide - Virtual Server idataagent (VMware) Table of Contents System Requirements
More informationSolution Brief: Commvault HyperScale Software
Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with
More informationCommVault Simpana 9 Virtual Server - Lab Validation
January 2012 CommVault Simpana 9 Virtual Server - Lab Validation Russ Fellows Evaluator Group Table of Contents Executive Summary... 1 Data Protection Challenges... 2 Overview of Evaluation... 2 Test Objectives...
More informationEMC SourceOne for File Systems
EMC SourceOne for File Systems Version 7.2 Administration Guide 302-000-958 REV 02 Copyright 2005-2015 EMC Corporation. All rights reserved. Published in the USA. Published December 9, 2015 EMC believes
More informationDisaster Happens; Don t Be Held
Disaster Happens; Don t Be Held Arm yourself with EVault Hostage Mike Challender Regional Channel Sales Manager Carbonite KEY CONSIDERATIONS FOR DISASTER-PROOF DATA What are your risk factors for data
More informationData Protection Positioning Paper- Internal
WHITE PAPER Data Protection Positioning Paper- Internal VERITAS NETBACKUP ENTERPRISE SERVER VERITAS NETBACKUP SERVER VERITAS BACKUP EXEC FOR WINDOWS SERVERS VERITAS BACKUP EXEC FOR NETWARE SERVERS UPDATED
More informationComprehensive Agentless Cloud Backup and Recovery for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery for the Enterprise Asigra, Inc. with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it
More informationQuick Start - BlueArc File Archiver
Page 1 of 20 Quick Start - BlueArc File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install
More informationVeritas Enterprise Vault 6.0 What s New
WHITE PAPER: ENTERPRISE SOLUTIONS Veritas Enterprise Vault 6.0 What s New A Review of the Latest Release of Veritas Enterprise Vault Software Now from Symantec White Paper: Symantec Enterprise Solutions
More informationOPTIMISATION DE VOTRE SAUVEGARDE. Daniel De Prezzo Technical Sales & Services Presales Manager Symantec
OPTIMISATION DE VOTRE SAUVEGARDE Daniel De Prezzo Technical Sales & Services Presales Manager Symantec AGENDA THE HITACHI DATA SYSTEMS AND SYMANTEC PARTNERSHIP INTELLIGENT INFORMATION MANAGEMENT SOLUTION
More informationCode42 Defines its Critical Capabilities Methodology
Tech Overview Product Defines its Critical Capabilities Methodology A technical analysis of top enterprise requirements from the leader in enterprise endpoint backup No enterprise technology purchase is
More informationBackup Solution. User Guide. Issue 01 Date
Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3
More informationST Symantec Enterprise Vault 8.0 Exchange (STS) Version 3.1
ST0-072 Symantec Enterprise Vault 8.0 Exchange (STS) Version 3.1 QUESTION NO: 1 What is an Enterprise Vault site? A. a SQL database for system-wide configuration B. a geographic configuration reference
More informationThe Expanding Role of Backup and Recovery in the Hybrid Enterprise
The Expanding Role of Backup and Recovery in the Hybrid Enterprise 6 STRATEGIES TO PROTECT MODERN INFRASTRUCTURE ON-PREMISES AND IN THE CLOUD It s no secret. Today s changing infrastructure landscape coupled
More informationDell PowerVault DL Backup-to-Disk Appliance Powered by CommVault
Dell PowerVault DL Backup-to-Disk Appliance Powered by CommVault Remote Office Backup Strategy CommVault DL Team Dell CommVault delltechcenter.com commvault.com/dell THIS WHITE PAPER IS FOR INFORMATIONAL
More informationVision deliver a fast, easy to deploy and operate, economical solution that can provide high availability solution for exchange server
Exchange server 2010 Interview Questions High Availability Filed under: Exchange Server 2010 exchange2k10 @ 5:04 pm 1. What are the vision and Goals of Exchange Server 2010 high availability? Vision deliver
More informationVirtual Server Agent for VMware VMware VADP Virtualization Architecture
Virtual Server Agent for VMware VMware VADP Virtualization Architecture Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 18 VMware VADP Virtualization Architecture - Virtual Server Agent for VMware
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationData Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM
Rethinking Data Protection Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM Today s Reality: The Rules of the Game Have Changed for Data Protection EXPLOSION OF DATA DATA EVERYWHERE
More informationKunal Mahajan Microsoft Corporation
Kunal Mahajan Microsoft Corporation 65+ Million Customer hosted Mailboxes 30+ Million Partner hosted Mailboxes 1,800 Partners Strategic Business Challenges Our Sales teams need to connect with the right
More informationChapter 4 Data Movement Process
Chapter 4 Data Movement Process 46 - Data Movement Process Understanding how CommVault software moves data within the production and protected environment is essential to understanding how to configure
More informationWhy HubStor? Comparison Guide. Target Audience. Getting The Most Value
Trusted partner: Comparison Guide HubStor is a data-aware cloud archive delivered exclusively on Azure for businesses needing to securely manage file system growth using the cloud to reduce storage costs
More informationHybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage
Panzura White Paper Hybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage By: Rich Weber, Product Management at Panzura This article describes how Panzura works
More informationManaging Data Growth and Storage with Backup Exec 2012
Managing Data Growth and Storage with Backup Exec 2012 Keith Fields, Director, Regional Product Management Aidan Finley, Product Marketing Manager Storage Reduction and Management with Backup Exec 2012
More informationCourse Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.
Course Content Course Description: This five-day course will teach you how to plan, configure, and manage the advanced features in a environment. The special areas of focus for this course include implementing
More informationRed Hat Enterprise Virtualization (RHEV) Backups by SEP
Red Hat Enterprise Virtualization (RHEV) Backups by SEP info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW AGENT BASED BACKUP IMAGE LEVEL BACKUP VIA RHEV API RHEV BACKUP WITH SEP
More informationData Protection Modernization: Meeting the Challenges of a Changing IT Landscape
Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.1 for Windows brings advanced online storage management to Microsoft Windows Server environments,
More information12 Minute Guide to Archival Search
X1 Technologies, Inc. 130 W. Union Street Pasadena, CA 91103 phone: 626.585.6900 fax: 626.535.2701 www.x1.com June 2008 Foreword Too many whitepapers spend too much time building up to the meat of the
More informationCOURSE OUTLINE: A Advanced Technologies of SharePoint 2016
Course Name 20339-2A Advanced Technologies of Course Duration 5 Days Course Structure Instructor-Led Course Overview This five-day course will teach you how to plan, configure, and manage the advanced
More informationThe future of data archives and nearline storage
The future of data archives and nearline storage Simon Watkins WW StoreEver Product Marketing Manager HP Storage Agenda Why archive? Why HP for archiving? Why HP StoreEver Tape for archiving? 2 Understanding
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationWHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?
WHAT IS FALCONSTOR? FAQS FalconStor Optimized Backup and Deduplication is the industry s market-leading virtual tape and LAN-based deduplication solution, unmatched in performance and scalability. With
More informationAdvanced Technologies of SharePoint 2016
Advanced Technologies of SharePoint 2016 20339-2; 5 Days; Instructor-led Course Description This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint
More informationAdvanced Technologies of SharePoint 2016
Advanced Technologies of SharePoint 2016 Course 20339-2A 5 Days Instructor-led, Hands on Course Information This five-day course will teach you how to plan, configure, and manage the advanced features
More informationNEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic
NEXT BIG THING Edgemo Summit 2016 Martin Plesner-Jacobsen Team Lead Nordic HQ Baar, Switzerland Founded in 2006, Veeam currently has 205,000 customers 41,000 ProPartners 2,200 employees worldwide 205,000+
More informationChapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties
Chapter 7 GridStor Technology GridStor technology provides the ability to configure multiple data paths to storage within a storage policy copy. Having multiple data paths enables the administrator to
More informationRocket Software Rocket Arkivio
Rocket Software Rocket Arkivio Who we are? Arkivio is a Brand of Rocket Software focused on providing solutions for intelligent management of Unstructured Data over its lifetime. Started in 2000 with vision
More informationEMC Data Domain for Archiving Are You Kidding?
EMC Data Domain for Archiving Are You Kidding? Bill Roth / Bob Spurzem EMC EMC 1 Agenda EMC Introduction Data Domain Enterprise Vault Integration Data Domain NetBackup Integration Q & A EMC 2 EMC Introduction
More informationA: Advanced Technologies of SharePoint 2016
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationFUJITSU Backup as a Service Rapid Recovery Appliance
FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports
More informationHow CloudEndure Disaster Recovery Works
How CloudEndure Disaster Recovery Works Technical White Paper How CloudEndure Disaster Recovery Works THE TECHNOLOGY BEHIND CLOUDENDURE S ENTERPRISE-GRADE DISASTER RECOVERY SOLUTION Introduction CloudEndure
More informationIBM Storage Software Strategy
IBM Storage Software Strategy Hakan Turgut 1 Just how fast is the data growing? 128 GB/ person The World s total data per person No Problem I I think I can do this We have a problem 24 GB/ person 0.8 GB/
More informationCA ARCserve Backup. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE
More informationDAOS - IBM Lotus Domino Attachment and Object Service
January 2011 DAOS - IBM Lotus Domino Attachment and Object Service ZL TECHNOLOGIES White Paper PAGE 1 What is DAOS Attachment Consolidation? In 2008, IBM Lotus Domino introduced a new attachment and object
More informationAzure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft
Azure Webinar Resilient Solutions March 2017 Sander van den Hoven Principal Technical Evangelist Microsoft DX @svandenhoven 1 What is resilience? Client Client API FrontEnd Client Client Client Loadbalancer
More informationDiscover the all-flash storage company for the on-demand world
Discover the all-flash storage company for the on-demand world STORAGE FOR WHAT S NEXT The applications we use in our personal lives have raised the level of expectations for the user experience in enterprise
More informationIM B32: What s New in NetBackup: The Vision and Roadmap
IM B32: What s New in NetBackup: The Vision and Roadmap Stephen Stange NetBackup Product Management Danny Milrad Director Product Marketing Agenda Market Trends & NetBackup Vision NetBackup Key Feature
More informationi365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer
ESG Lab Review i365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer Abstract: This ESG Lab review documents
More informationCommvault Cloud Solutions
Commvault Cloud Solutions GET STRATEGIC WITH YOUR CLOUD The cloud is changing everything. But even as it transforms IT strategies, the cloud presents real challenges when it comes to operationalizing mainstream
More informationDOCAVE ONLINE. Your Cloud. Our SaaS. A Powerful Combination. Online Services. Technical Overview ADMINISTRATION BACKUP & RESTORE
Online Services Technical Overview DOCAVE ONLINE Your Cloud. Our SaaS. A Powerful Combination. ADMINISTRATION Centralized Management Manage SharePoint Online security, settings, configurations, and content
More informationData Archiving Managing the Mountain. Andrew Quinn 17/01/2012
Data Archiving Managing the Mountain Andrew Quinn 17/01/2012 IDC White Paper sponsored by EMC Extracting Value from Chaos, June 2011 The world s collective data volume doubles every two years Since 2005
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More informationBackups to the Cloud. Agenda. Introductions. Our Journey to Move Beyond Tape. pollev.com/ryanbass401. Ryan Bass
Backups to the Cloud Our Journey to Move Beyond Tape pollev.com/ryanbass401 Educause 2018 Presented by: Ryan Bass, Juliana Kutch, Thomas Litterer, Shingi Marangwanda Introductions Ryan Bass Juliana Kutch
More informationRemove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview
Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection
More informationControl-M and Payment Card Industry Data Security Standard (PCI DSS)
Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member
More informationIBM Spectrum Protect HSM for Windows Version Administration Guide IBM
IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM Note: Before you use this information and the product
More informationVeritas NetBackup 6.5 Clients and Agents
Veritas NetBackup 6.5 Clients and Agents The Veritas NetBackup Platform Next-Generation Data Protection Overview Veritas NetBackup provides a simple yet comprehensive selection of innovative clients and
More informationFIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates
Case Study FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates World s largest global provider dedicated to banking
More informationTransform Your Enterprise Search and ediscovery on the AWS Cloud.
Transform Your Enterprise Search and ediscovery on the AWS Cloud. Welcome Sheri Sullivan Senior Partner Marketing Manager Amazon Web Services Webinar Overview Submit Your Questions using the Q&A tool.
More informationSymantec Exam Administration of Symantec Enterprise Vault 8.0 for Microsoft Exchange Version: 6.0 [ Total Questions: 265 ]
s@lm@n Symantec Exam 250-307 Administration of Symantec Enterprise Vault 8.0 for Microsoft Exchange Version: 6.0 [ Total Questions: 265 ] Topic 1, Volume A Question No : 1 - (Topic 1) A network administrator
More information