News
6/15/2011
01:08 PM
George Crump
George Crump
Commentary
50%
50%

Time To Replace Your Backup Application?

More than half of large organizations say they'll consider a new backup system during the next three years. Here's how to get the timing right.

While the actual percentages vary, there are several surveys stating that over 50% of large organizations are going to at least consider a new backup application over the next three years or so. How do you know if it's time to replace your backup application and--if it is time--what you should be looking for?

One of my problems with these surveys is that the question about backup application replacement is usually phrased something like "Will you consider changing your backup application in the next three years?" Well of course you will consider it, most IT professionals are always open to at least considering a new, better way of doing anything.

Most IT professionals also know that actually switching a backup application is a lot harder than it sounds. You have the obvious challenges of buying the new software, implementing it, and learning how to use it. Despite what vendors say, no application is perfect, so that means you have to also learn what doesn't work like you need it to and develop workarounds for that. Finally you also have to develop a strategy for accessing the legacy data that was created by your old backup application. In short, the new product has to be very compelling or your current application has to have really let you down for you to move beyond consideration to actual switching.

The other variable to consider is whether you can add something to your current backup application that makes it easier to live with, or even more reliable, so that you don't have to throw the whole thing out. Disk backup appliances that do data deduplication are an excellent example of something that can be easily implemented to extend the usefulness of your current application.

At some point, though, change is probably inevitable. What usually drives the change to a new backup application is the rise of a specific platform or operating system. We saw this in the data center as we moved from mainframe to Unix systems, from Unix systems to Windows, and we are seeing it again in the move from Windows standalone servers to virtualized Windows and Linux servers. In each one of these platform shifts, the leading backup application typically changed, as well.

Virtualization of servers may be the most significant of these shifts and, as a result, we are seeing traditional enterprise backup application add or improve virtualized server support, as well as seeing a whole new breed of backup applications. As we discuss in "VMware Backup--Feature or Platform," the IT manager has to decide how they are going to protect the virtualized environment. Is it "just another OS" or is it a platform that is the core of the data protection strategy?

In our next entry we will begin to cover what you should be looking for in a new backup application, starting with: should deduplication be built in or should it be added on?

Track Storage Switzerland on Twitter

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.