News
6/15/2011
01:08 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Time To Replace Your Backup Application?

More than half of large organizations say they'll consider a new backup system during the next three years. Here's how to get the timing right.

While the actual percentages vary, there are several surveys stating that over 50% of large organizations are going to at least consider a new backup application over the next three years or so. How do you know if it's time to replace your backup application and--if it is time--what you should be looking for?

One of my problems with these surveys is that the question about backup application replacement is usually phrased something like "Will you consider changing your backup application in the next three years?" Well of course you will consider it, most IT professionals are always open to at least considering a new, better way of doing anything.

Most IT professionals also know that actually switching a backup application is a lot harder than it sounds. You have the obvious challenges of buying the new software, implementing it, and learning how to use it. Despite what vendors say, no application is perfect, so that means you have to also learn what doesn't work like you need it to and develop workarounds for that. Finally you also have to develop a strategy for accessing the legacy data that was created by your old backup application. In short, the new product has to be very compelling or your current application has to have really let you down for you to move beyond consideration to actual switching.

The other variable to consider is whether you can add something to your current backup application that makes it easier to live with, or even more reliable, so that you don't have to throw the whole thing out. Disk backup appliances that do data deduplication are an excellent example of something that can be easily implemented to extend the usefulness of your current application.

At some point, though, change is probably inevitable. What usually drives the change to a new backup application is the rise of a specific platform or operating system. We saw this in the data center as we moved from mainframe to Unix systems, from Unix systems to Windows, and we are seeing it again in the move from Windows standalone servers to virtualized Windows and Linux servers. In each one of these platform shifts, the leading backup application typically changed, as well.

Virtualization of servers may be the most significant of these shifts and, as a result, we are seeing traditional enterprise backup application add or improve virtualized server support, as well as seeing a whole new breed of backup applications. As we discuss in "VMware Backup--Feature or Platform," the IT manager has to decide how they are going to protect the virtualized environment. Is it "just another OS" or is it a platform that is the core of the data protection strategy?

In our next entry we will begin to cover what you should be looking for in a new backup application, starting with: should deduplication be built in or should it be added on?

Track Storage Switzerland on Twitter

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If you’re still focused on securing endpoints, you’ve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web