DCIG is pleased to announce the immediate availability of the 2024-25 DCIG TOP 5 2PB+ Cyber Secure Backup Target US Edition Report. This report provides guidance on the TOP 5 cyber secure backup targets that enterprises should consider in their fight against ransomware. These TOP 5 backups targets afford enterprises the best options for accelerating backups, repelling ransomware attacks, and facilitating restores and recoveries.
Category: Backup Appliance
DCIG is pleased to announce the immediate availability of the 2024-25 DCIG TOP 5 2PB+ Cyber Secure Backup Target Global Edition Report. This report provides guidance on the TOP 5 cyber secure backup targets that enterprises should consider in their fight against ransomware. These TOP 5 backups targets afford enterprises the best options for accelerating backups, repelling ransomware attacks, and facilitating restores and recoveries.
DCIG last formally researched, evaluated, and published a report on deduplicating backup targets in 2018 when it still produced Buyer’s Guides. Since then, the features that organizations expect backup targets to possess, and deliver, have evolved significantly. Organizations specifically expect these backup targets to offer specific cyber secure features that help them protect backups and recover from ransomware.
Over the last 20 years deduplication appliances have become integral components in the backup strategies of many organizations. However, as more organizations implement hybrid clouds, they need to re-examine the role that deduplication appliances play in them. While these appliances work well on-premises, they possess specific weaknesses that become more apparent when performing cloud recoveries
Every now and then a phrase shows up in the tech industry that may hurt more than it helps. ‘Instant restore’ represents one of those terms. In my mind, the word ‘instant’ implies ‘occurs in a moment.’ In practical terms, from a technical perspective, that translates into a few seconds or perhaps up to a minute or two. However, too many deduplication appliance providers use the phrase ‘instant restore’ to describe a feature of their product. Unfortunately, the use of this term may leave organizations with the impression these products instantly restore more swiftly and robustly than they do.
Every company periodically reviews the backup solution it uses to protect and recover its data. However, as companies review which backup solution they want, it also behooves them to consider new, modern ways in which to procure and deploy it.
Scalable data protection appliances have arguably emerged as one of the hottest backup trends in quite some time, possibly since the introduction of deduplication into the backup process. These appliances offer backup software, cloud connectivity, replication, and scalable storage in a single, logical converged or hyperconverged infrastructure platform offering that simplify backup while positioning a company to seamlessly implement the appliance as part of its disaster recovery strategy or even create a DR solution for the first time.
Companies of all sizes pay more attention to their backup and recovery infrastructure than perhaps ever before. While they still rightfully prioritize their production infrastructure over their backup one, companies seem to recognize and understand that can use backups as more than just insurance policies to recover their production data. This is resulting in cutting edge innovations such as analytics, microservices, and scalable storage finding their way into backup solutions in general and backup appliances specifically.
Companies are always on the lookout for simpler, most cost-effective methods to manage their infrastructure. This explains, in part, the emergence of scale-out architectures over the last few years as a preferred means for implementing backup appliances. It is as scale-out architectures gain momentum that it behooves companies taking a closer look at the benefits and drawbacks of both scale-out and scale-up architectures to make the best choice for their environment.
One of the more perplexing challenges that Nutanix administrators face is how to protect the data in their Nutanix deployments. Granted, Nutanix natively offers its own data protection utilities. However, these utilities leave gaps that enterprises are unlikely to find palatable when protecting their production applications. This is where Comtrade Software’s HYCU and ExaGrid come into play as their combined solutions provide a more affordable and elegant approach to protecting Nutanix environments.