Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 49 - 64 of 65 white papers, page 4 of 5.
ESG Showcase - Time to Better Leverage Your File and Object Data
The need to handle unstructured data according to business relevance is becoming urgent. Modern datarelated demands have begun surpassing what traditional file and object storage architectures can achieve. Businesses today need an unstructured data storage environment that lets end-users easily and flexibly access the benefits of the file- and object-based information they need to do their jobs.
It’s time for a “Nirvana” between file and object: The marketplace has long been debating which of the two unstructured data type models is the “right one.” But data is data. If you remove the traditional constraints and challenges associated with those two particular technologies, it becomes possible to imagine a type of data service that supports both. That kind of solution would give an organization the benefits of a global multi-site namespace (i.e., object style), including the ability to address a piece of data regardless of where it is in a folder hierarchy, or what device it’s stored on. And it would offer the rich metadata that object storage is known for. This new kind of solution would also deliver the performance and ease of use that file systems are known for. DataCore says it is providing such a solution, called vFilO. To vFilO, data is just data, where metadata is decoupled but tightly aligned with the data, and data’s location is independent of data access needs or metadata location. It bridges both worlds by providing a system that has all the benefits of file and object—without any of the limitations. It is a next-generation system built on a different paradigm, promising to bridge the world of file and object. It just might be the answer IT departments need. No longer required to pick between two separate systems, IT organizations can find great value in a consolidated, global, unified storage system that can deliver on the business’s needs for unstructured data.
The Time is Now for File Virtualization
DataCore’s vFilO is a distributed files and object storage virtualization solution that can consume storage from a variety of providers, including NFS or SMB file servers, most NAS systems, and S3 Object Storage systems, including S3-based public cloud providers. Once vFilO integrates these various storage systems into its environment, it presents users with a logical file system and abstracts it from the actual physical location of data.

DataCore vFilO is a top-tier file virtualization solution. Not only can it serve as a global file system, IT can also add new NAS systems or file servers to the environment without having to remap users of the new hardware. vFilO supports live migration of data between the storage systems it has assimilated and leverages the capabilities of the global file system and the software’s policy-driven data management to move older data to less expensive storage automatically; either high capacity NAS or an object storage system. vFilO also transparently moves data from NFS/SMB to object storage. If the user needs access to this data in the future, they access it like they always have. To them, the data has not moved.

The ROI of File virtualization is powerful, but it has struggled to gain adoption in the data center. File Virtualization needs to be explained, and explaining it takes time. vFilO more than meets the requirements to qualify as a top tier file virtualization solution. DataCore has the advantage of over 10,000 customers that are much more likely to be receptive to the concept since they have already embraced block storage virtualization with SANSymphony. Building on its customer base as a beachhead, DataCore can then expand File Virtualization’s reach to new customers, who, because of the changing state of unstructured data, may finally be receptive to the concept. At the same time, these new file virtualization customers may be amenable to virtualizing block storage, and it may open up new doors for SANSymphony.

IDC: DataCore SDS: Enabling Speed of Business and Innovation with Next-Gen Building Blocks
DataCore solutions include and combine block, file, object, and HCI software offerings that enable the creation of a unified storage system which integrates more functionalities such as data protection, replication, and storage/device management to eliminate complexity. They also converge primary and secondary storage environments to give a unified view, predictive analytics and actionable insights. DataCore’s newly engineered SDS architecture make it a key player in the modern SDS solutions spa
The enterprise IT infrastructure market is undergoing a once-in-a-generation change due to ongoing digital transformation initiatives and the onslaught of applications and data. The need for speed, agility, and efficiency is pushing demand for modern datacenter technologies that can lower costs while providing new levels of scale, quality, and operational efficiency. This has driven strong demand for next-generation solutions such as software-defined storage/networking/compute, public cloud infrastructure as a service, flash-based storage systems, and hyperconverged infrastructure. Each of these solutions offers enterprise IT departments a way to rethink how they deploy, manage, consume, and refresh IT infrastructure. These solutions represent modern infrastructure that can deliver the performance and agility required for both existing virtualized workloads and next-generation applications — applications that are cloud-native, highly dynamic, and built using containers and microservices architectures. As we enter the next phase of datacenter modernization, businesses need to leverage newer capabilities enabled by software-defined storage that help them eliminate management complexities, overcome data fragmentation and growth challenges, and become a data-driven organization to propel innovation. As enterprises embark on their core datacenter modernization initiatives with compelling technologies, they should evaluate enterprise-grade solutions that redefine storage and data architectures designed for the demands of the digital-native economy. Digital transformation is a technology-based business strategy that is becoming increasingly imperative for success. However, unless infrastructure provisioning evolves to suit new application requirements, IT will not be viewed as a business enabler. IDC believes that those organizations that do not leverage proven technologies such as SDS to evolve their datacenters truly risk losing their competitive edge.
IDC: SaaS Backup and Recovery: Simplified Data Protection Without Compromise
Although the majority of organizations have a "cloud first" strategy, most also continue to manage onsite applications and the backup infrastructure associated with them. However, many are moving away from backup specialists and instead are leaving the task to virtual infrastructure administrators or other IT generalists. Metallic represents Commvault's direct entry into one of the fastest-growing segments of the data protection market. Its hallmarks are simplicity and flexibility of deployment

Metallic is a new SaaS backup and recovery solution based on Commvault's data protection software suite, proven in the marketplace for more than 20 years. It is designed specifically for the needs of medium-scale enterprises but is architected to grow with them based on data growth, user growth, or other requirements. Metallic initially offers either monthly or annual subscriptions through reseller partners; it will be available through cloud service providers and managed service providers over time. The initial workload use cases for Metallic include virtual machine (VM), SQL Server, file server, MS Office 365, and endpoint device recovery support; the company expects to add more use cases and supported workloads as the solution evolves.

Metallic is designed to offer flexibility as one of the service's hallmarks. Aspects of this include:

  • On-demand infrastructure: Metallic manages the cloud-based infrastructure components and software for the backup environment, though the customer will still manage any of its own on- premise infrastructure. This environment will support on-premise, cloud, and hybrid workloads. IT organizations are relieved of the daily task of managing the infrastructure components and do not have to worry about upgrades, OS or firmware updates and the like, for the cloud infrastructure, so people can repurpose that time saved toward other activities.
  • Metallic offers preconfigured plans designed to have users up and running in approximately 15 minutes, eliminating the need for a proof-of-concept test. These preconfigured systems have Commvault best practices built into the design, or organizations can configure their own.
  • Partner-delivered services: Metallic plans to go to market with resellers that can offer a range of services on top of the basic solution's capabilities. These services will vary by provider and will give users a variety of choices when selecting a provider to match the services offered with the organization's needs.
  • "Bring your own storage": Among the flexible options of Metallic, including VM and file or SQL database use cases, users can deploy their own storage, either on-premise or in the cloud, while utilizing the backup/recovery services of Metallic. The company refers to this option as "SaaS Plus."
7 Tips to Safeguard Your Company's Data
Anyone who works in IT will tell you, losing data is no joke. Ransomware and malware attacks are on the rise, but that’s not the only risk. Far too often, a company thinks data is backed up – when it’s really not. The good news? There are simple ways to safeguard your organization. To help you protect your company (and get a good night’s sleep), our experts share seven common reasons companies lose data – often because it was never really protected in the first place – plus tips to help you avoi

Anyone who works in IT will tell you, losing data is no joke. Ransomware and malware attacks are on the rise, but that’s not the only risk. Far too often, a company thinks data is backed up – when it’s really not. The good news? There are simple ways to safeguard your organization. To help you protect your company (and get a good night’s sleep), our experts share seven common reasons companies lose data – often because it was never really protected in the first place – plus tips to help you avoid the same.

Metallic’s our engineers and product team have decades of combined experience protecting customer data. When it comes to backup and recovery, we’ve seen it all – the good, the bad and the ugly.

We understand backup is not something you want to worry about – which is why we’ve designed MetallicTM enterprise- grade backup and recovery with the simplicity of SaaS. Our cloud-based data protection solution comes with underlying technology from industry-leader Commvault and best practices baked in. Metallic offerings help you ensure your backups are running fast and reliably, and your data is there when you need it. Any company can be up and running with simple, powerful backup and recovery in as little as 15 minutes.

VPN vs. VDI - What Should You Choose?
Many organizations are using Virtual Private Networks (VPN) to provide employees with access to their digital workspaces. However, as VPN is posing a global data security risk to businesses, IT departments may want to re-think their strategy when it comes to providing remote access. What are the differences between VPN and VDI, and which one should you choose?

With times changing continuously in the tech world, more and more workloads are moving to the cloud and a VPN solution is becoming outdated - services are no longer just located in your office or data center, but a hybrid combination of on-premises and public cloud services. Leveraging cloud-based solutions means that your company can centrally control access to applications while reinforcing security.

As an affordable all-in-one VDI solution, Parallels RAS allows users to securely access virtual workspaces from anywhere, on any device, anytime. Parallels RAS centralizes management of the IT infrastructure, streamlines multi-cloud deployments, enhances data security, and improves process automation.

Confronting modern stealth
How did we go from train robberies to complex, multi-billion-dollar cybercrimes? The escalation in the sophistication of cybercriminal techniques, which overcome traditional cybersecurity and wreak havoc without leaving a trace, is dizzying. Explore the methods of defense created to defend against evasive attacks, then find out how Kaspersky’s sandboxing, endpoint detection and response, and endpoint protection technologies can keep you secure—even if you lack the resources or talent.
Explore the dizzying escalation in the sophistication of cybercriminal techniques, which overcome traditional cybersecurity and wreak havoc without leaving a trace. Then discover the methods of defense created to stop these evasive attacks.

Problem:
Fileless threats challenge businesses with traditional endpoint solutions because they lack a specific file to target. They might be stored in WMI subscriptions or the registry, or execute directly in the memory without being saved on disk. These types of attack are ten times more likely to succeed than file-based attacks.

Solution:
Kaspersky Endpoint Security for Business goes beyond file analysis to analyze behavior in your environment. While its behavioral detection technology runs continuous proactive machine learning processes, its exploit prevention technology blocks attempts by malware to exploit software vulnerabilities.

Problem:
The talent shortage is real. While cybercriminals are continuously adding to their skillset, businesses either can’t afford (or have trouble recruiting and retaining) cybersecurity experts.

Solution:
Kaspersky Sandbox acts as a bridge between overwhelmed IT teams and industry-leading security analysis. It relieves IT pressure by automatically blocking complex threats at the workstation level so they can be analyzed and dealt with properly in time.


Problem:
Advanced Persistent Threats (APTs) expand laterally from device to device and can put an organization in a constant state of attack.

Solution:
Endpoint Detection and Response (EDR) stops APTs in their tracks with a range of very specific capabilities, which can be grouped into two categories: visibility (visualizing all endpoints, context and intel) and analysis (analyzing multiple verdicts as a single incident).
    
Attack the latest threats with a holistic approach including tightly integrated solutions like Kaspersky Endpoint Detection and Response and Kaspersky Sandbox, which integrate seamlessly with Kaspersky Endpoint Protection for Business.
After the Lockdown – Reinventing the Way Your Business Works
As a result of the Covid-19 lockdown experience, temporary measures will be scaled back and adoption of fully functional “Remote” workplaces will now be accelerated. A reduction in the obstacles for moving to virtual desktops and applications will be required so that businesses can be 100% productive during Business Continuity events. The winners will be those organizations who use and explore the possibilities of a virtual workplace every day.

As lockdowns end, organziations are ready to start planning on how to gear their business for more agility, with a robust business continuity plan for their employees and their technology. A plan that includes technology which enables their business to work at full capacity rather than just getting by.

A successful Business Continuity Plan includes key technology attributes needed for employees to be 100% productive before, during and after a Covid-19 type event. The technology should be:

  • A device agnostic, simple, intuitive and responsive user experienceIt should enhance data security
  • It should increase the agility of IT service delivery options
  • Reduce the total cost of ownership (TCO) of staff technology delivery
  • Must be simple to deploy, manage and expand remotely

As a result of the Covid-19 lockdown experience, temporary measures will be scaled back and adoption of fully functional “Remote” workplaces will now be accelerated. A reduction in the obstacles for moving to virtual desktops and applications will be required so that businesses can be 100% productive during Business Continuity events. The winners will be those organizations who use and explore the possibilities of a virtual workplace every day.

As an affordable but scalable all-in-one virtual desktop and application solution, Parallels Remote Application Server (RAS) allows users to securely access virtual workspaces from anywhere, on any device, at any time. Parallels RAS centralizes management of the IT infrastructure, streamlines multi-cloud deployments, enhances data security and improves process automation.

10 Best Practices for VM Backup
Topics: VM, backup, Veeam
Proper protection for critical applications and implementing off‑site solutions are essential to keeping VM data available while minimizing data loss. Every business should have a backup strategy to guarantee virtual machines are properly protected and recoverable.

When backing up virtual machines, one should consider applications running on the machine, how critical the machine is for business operations and how fast you can get back up running when a disaster occurs. Proper protection for critical applications and implementing off‑site solutions are essential to keeping VM data available while minimizing data loss. Every business should have a backup strategy to guarantee virtual machines are properly protected and recoverable.

Join this webinar to learn more about:

•    Factors affecting VM backups
•    Off‑site data protection strategies
•    Ensuring data is recoverable and secure

Top 10 Best Practices for VMware Backups
Topics: vSphere, backup, Veeam
Backup is the foundation for restores, so it is essential to have backups always available with the required speed. The “Top 10 Best Practices for vSphere Backups” white paper discusses best practices with Veeam Backup & Replication and VMware vSphere.

More and more companies come to understand that server virtualization is the way for modern data safety. In 2019, VMware is still the market leader and many Veeam customers use VMware vSphere as their preferred virtualization platform. But, backup of virtual machines on vSphere is only one part of service Availability. Backup is the foundation for restores, so it is essential to have backups always available with the required speed. The “Top 10 Best Practices for vSphere Backups” white paper discusses best practices with Veeam Backup & Replication and VMware vSphere, such as:

•    Planning your data restore in advance
•    Keeping track of your data backup software updates and keeping your backup tools up-to-date
•    Integrating storage based snapshots into your Availability concept
•    And much more!

Beat ransomware: Education, Implementation and remediation with Veeam
These strategies will cover more than just how to configure Veeam products and recover from ransomware. They’ll also give you tools and techniques that can be used to address ransomware ahead of the problem
The war on ransomware is real. Today’s organizations need to have a strong, multi-layered defense and strategy to address ransomware. In this paper, Rick Vanover from Veeam® will provide organizations with practical steps they can take to protect data and avoid being in a situation where data loss or ransom payment are their only options. These strategies will cover more than just how to configure Veeam products and recover from ransomware. They’ll also give you tools and techniques that can be used to address ransomware ahead of the problem.
Hyper‑V: best practices for protection and security
Topics: Hyper-V, Backup, Veeam
Join us for a webinar discussing business continuity and disaster recovery in Hyper‑V environments from a general perspective.
Join us for a webinar discussing business continuity and disaster recovery in Hyper‑V environments from a general perspective.
More specifically, we’ll cover:
•    Trends and common backup pitfalls to avoid
•    Different types and methods of Hyper‑V replication
•    How to keep your backups secure
•    And more!
Office 365 Backup For Dummies
This Office 365 Backup For Dummies e Book is the best guide for learning the what, why and how of Microsoft Office 365 data protection
This Office 365 Backup For Dummies e Book is the best guide for learning the what, why and how of Microsoft Office 365 data protection. It will help you develop an effective Office 365 backup and recovery strategy.
AWS Backup for Dummies
Topics: AWS, backup, Veeam
The ultimate guide to AWS data backup
So it turns out that data doesn’t protect itself. And despite providing what might be the most secure and reliable compute platform the Universe has ever seen, Amazon Web Services (AWS) can’t guarantee that you’ll never lose data either. To understand why that is, you’ll need to face your worst nightmares while visualizing all the horrifying things that can go wrong, and then boldly adopt some best‑practice solutions as you map out a plan to protect yourself.
The Changing Role of Backup and Secondary Storage
The role of backup and secondary storage is changing in the data center. Hyperconverged infrastructures are influencing secondary storage and backup for the better, and you can see for yourself how integrating Nutanix and Veeam deliver increased business results.

The role of backup and secondary storage is changing in the data center. Hyperconverged infrastructures are influencing secondary storage and backup for the better, and you can see for yourself how integrating Nutanix and Veeam deliver increased business results.

Download this white paper to learn how to:

•    Leverage the power of hyperconverged infrastructure for backup and secondary storage
•    Simplify management, operational efficiency and support\
•    Predict scalability with granular application recovery
•    Design for the future, not the past
•    Scale with the business in simple steps

The Backup Bible - Part 1: Creating a Backup & Disaster Recovery Strategy
This eBook is the first of a 3-part series covering everything you need to know about backup and disaster recovery. By downloading this ebook you'll automatically receive part 2 and part 3 by email as soon as they become available!

INTRODUCTION

Humans tend to think optimistically. We plan for the best outcomes because we strive to make them happen. As a result, many organizations implicitly design their computing and data storage systems around the idea that they will operate as expected. They employ front-line fault-tolerance technologies such as RAID and multiple network adapters that will carry the systems through common, simple failures. However, few design plans include comprehensive coverage of catastrophic failures. Without a carefully crafted approach to backup, and a strategic plan to work through and recover from disasters, an organization runs substantial risks. They could experience data destruction or losses that cost them excessive amounts of time and money. Business principals and managers might even find themselves facing personal liability consequences for failing to take proper preparatory steps. At the worst, an emergency could permanently end the enterprise. This book seeks to guide you through all stages of preparing for, responding to, and recovering from a substantial data loss event. In this first part, you will learn how to assess your situation and plan out a strategy that uniquely fits your needs.

WHO SHOULD READ THIS BOOK

This book was written for anyone with an interest in protecting organizational data, from system administrators to business owners. It explains the terms and technologies that it covers in simple, approachable language. As much as possible, it focuses on the business needs first. However, a reader with little experience in server and storage technologies may struggle with applying the content. To put it into action, use this material in conjunction with trained technical staff.

top25