As more organizations embrace a cloud-first model, everything in their IT infrastructure comes under scrutiny, to include backup and recovery. A critical examination of this component of their infrastructure often prompts them to identify their primary objectives for recovery. In this area, they ultimately want simplified application recoveries that meet their recovery point and time objectives. To deliver this improved recovery experience, organizations may now turn to a new generation of disaster-recovery-as-a-service (DRaaS) offerings.
Last month I shared five reasons why organizations choose DCIG to prepare competitive intelligence reports on their behalf. However, that list represented only a glimpse into why companies select DCIG. This month, I share five more reasons why companies engage DCIG to produce these reports to equip their sales staff and partners.
Using cloud storage often represents the first way that most companies adopt the cloud. They leverage cloud storage to archive their data, as a backup target, share files, or for long term data retention. These approaches offer a low risk means for companies to get started in the cloud. However, with more cloud storage offerings available than ever, companies need to ask and answer more pointed questions to screen them.
Every company wants to make the right cloud decision for their business. As a result, more companies than ever ask their vendors to describe the cloud capabilities of their products. However, as you ask your vendors cloud questions, verify that you define the cloud the same way. You may find that how you and your vendors define the cloud differ significantly which can quickly result in communication breakdowns.
More companies than ever want to use the cloud as part of their overall IT strategy. To do so, they often look to achieve some quick wins in the cloud to demonstrate its value. Achieving these quick wins also serves to give them some practical hands on experience in the cloud. Incorporating the cloud into your backup and disaster recovery (DR) processes may serve as the best way to get these wins.
At a high level, anyone can prepare a competitive intelligence report. All one needs is an Excel spreadsheet, a web browser, access to the Internet, a list of your competitors, and a list of product features. Then, boom, just like that, you have a report. However, companies that engage DCIG to create Competitive Intelligence Reports want much more that an Excel spreadsheet with a list of features and check marks in order to truly empower their sales staff and partners.
Every time DCIG attends a conference, we attempt to meet with as many exhibitors as possible to get an overview of their solutions and the key business challenges they solve. We then identify three that best address these challenges. In attending the Nutanix .NEXT event last week in Anaheim, CA, DCIG awarded these three products as Best of Show.
Any time a new operating system platform comes to market, one backup solution tends to lead in providing a robust set of data protection features that companies can quickly, easily, and economically deploy. It happened with Unix. It happened with Windows and VMware. Now it is happening again with the Nutanix Acropolis operating system (AOS) as HYCU continues to make significant product enhancements in its march to become the default backup solution for Nutanix-centric environments.
Scalable data protection appliances have arguably emerged as one of the hottest backup trends in quite some time, possibly since the introduction of deduplication into the backup process. These appliances offer backup software, cloud connectivity, replication, and scalable storage in a single, logical converged or hyperconverged infrastructure platform offering that simplify backup while positioning a company to seamlessly implement the appliance as part of its disaster recovery strategy or even create a DR solution for the first time.
Every company tends to believe that its products are the best in whatever market it services. Nothing wrong with that mindset – it helps your company sell its products and succeed. However, convincing a skeptical buyer of the superiority of your company’s product changes the dynamics of the conversation. He or she expects you to provide some facts to back up your claims to persuade him or her to buy from you.
The DCIG 2019-20 Enterprise Deduplication Backup Target Appliance Buyer’s Guide helps enterprises assess the enterprise deduplication backup target appliance marketplace to help them identify which appliance may be the best fit for their environment. This Buyer’s Guide includes data sheets for 19 enterprise deduplication backup target appliances that achieved rankings of Recommended and Excellent. These products are available from five vendors including Cohesity, Dell EMC, ExaGrid, HPE, and NEC.
Companies of all sizes pay more attention to their backup and recovery infrastructure than perhaps ever before. While they still rightfully prioritize their production infrastructure over their backup one, companies seem to recognize and understand that can use backups as more than just insurance policies to recover their production data. This is resulting in cutting edge innovations such as analytics, microservices, and scalable storage finding their way into backup solutions in general and backup appliances specifically.
Companies are always on the lookout for simpler, most cost-effective methods to manage their infrastructure. This explains, in part, the emergence of scale-out architectures over the last few years as a preferred means for implementing backup appliances. It is as scale-out architectures gain momentum that it behooves companies taking a closer look at the benefits and drawbacks of both scale-out and scale-up architectures to make the best choice for their environment.
Malware – and specifically ransomware – tends to regularly make headlines with some business somewhere in the world reporting having its data encrypted by it. Due to this routine occurrence, companies need to acknowledge that their standard first line defenses such as cybersecurity and backup software no longer completely suffice to detect malware. To augment these defenses, companies need to take new steps to shore up these traditional defenses which, for many, will start with creating a secondary perimeter around their backup stores to detect the presence of malware.
The cloud has gone mainstream with more companies than ever looking to host their production applications with general-purpose cloud providers such as the Google Cloud Platform (GCP). As this occurs, companies must identify backup solutions architected for the cloud that capitalize on the native features of each provider’s cloud offering to best protect their virtual machines (VMs) hosted in the cloud.
One would think that with the continuing explosion in the amount of data being created every year, the number of appliances that can reduce the amount of data stored by deduplicating it would be increasing. That statement is both true and flawed. On one hand, the number of backup and storage appliances that can deduplicate data has never been higher and continues to increase. On the other hand, the number of vendors that create physical target-based appliances dedicated to the deduplication of backup data continues to shrink.
The ratification in November 2018 of the NVMe/TCP standard officially opened the doors for NVMe/TCP to begin to find its way into corporate IT environments. Earlier this week I had the opportunity to listen in on a webinar that SNIA hosted which provided an update on NVMe/TCP’s latest developments and its implications for enterprise IT. Here are four key takeaways from that presentation and how these changes will impact corporate data center Ethernet network designs.
On the surface, all-inclusive software licensing sounds great. You get all the software features that the product offers at no additional charge. You can use them – or not use them – at your discretion. It simplifies product purchases and ongoing licensing. But what if you opt not to use all the product’s features or only need a small subset of them? In those circumstances, you need to take a hard look at any product that offers all-inclusive software licensing to determine if it will deliver the value that you expect.
In 2019 the level of interest that companies expressed in using artificial Intelligence (AI) and machine learning (ML) exploded. Their interest is justifiable. These technologies gather the almost endless streams of data coming out of the scads of devices that companies deploy everywhere, analyze it, and then turn it into useful information. But time is the secret ingredient that companies must look for as they look to select an effective AI or ML product.