Backup and Recovery Software: Top 3 Things Everyone Needs to Know

<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >Backup and Recovery Software: Top 3 Things Everyone Needs to Know</span>

Apr 14

Apr 14

Symantec

Backup-and-recovery-solutions

Disaster can strike any enterprise at any time, but not even a Category 5 hurricane or a five-alarm fire can keep a well-prepared business down for long. In fact, the right backup and recovery solution, correctly configured and properly administered, can get your customers back up and running before the dust has even settled. Here are three things to know about today's backup and recovery software landscape.

1. Everyone's got their heads in the cloud

Like a hurricane cloud swirling over the ocean, cloud computing is expanding rapidly. One of the top backup and recovery trends of 2015 is the designation of cloud infrastructure as the main backup target. Cloud-centric backup solutions have a number of benefits, among them a reduced need for backup hardware and its associated costs and an astronomical increase in storage scalability, a must to meet the exploding data volumes of modern enterprises.

 Cloud backup isn't without its downsides, though. The biggest of those downsides are the massive bandwidth consumption that can result from regular backups to the cloud, and the cloud's less-than-optimal recovery speeds. If your customers express a desire to put the bulk of their data in the cloud, remind them that while the cloud has its uses as one of several storage tiers, they may want to explore options that don’t depend on the WAN for their most mission-critical applications and data.

 2. Virtual machines change the physical hardware game

Server virtualization has become a commonplace sight in the modern enterprise. That can both ease and complicate the backup and recovery process, depending on the solution deployed. Virtual machines (VMs) can—and are—spun up in a matter of minutes and discarded just as easily, making successful system imaging and backups a moving target. Guide your customers towards backup and recovery software solutions made to seamlessly incorporate both virtual and physical machines even if they haven't yet embraced virtualization, because it's almost inevitable that at some point, they will.

 When it comes to the recovery side of the backup and recovery equation, the right software enables server virtualization to significantly cut the costs of system restoration to hardware. No longer do organizations have to keep exact hardware duplicates around for system recovery. VMs on just about any server can be provisioned with exactly the right configurations to work as target machines instead. Customers iffy about the value of virtualization may be persuaded by that fact.

3. Integration is king

Gone are the days of the IT silo. These days, sysadmins and DevOps have a hand in the network, the network determines the performance of storage deployments, compliance requirements mean collaboration between legal eagles and IT security folk, and the walls are crumbling between every component of the enterprise data environment. Customers used to cobbling together a backup and recovery strategy out of disparate point solutions will find themselves struggling in the age of convergence. To help ensure their continued success, guide them towards backup and recovery software solutions with high interoperability and the ability to unify disaster recovery and business continuity efforts across not only compute, storage, and networking, but also from on-premises hardware through virtual environments and all the way up into the cloud.

In enterprise IT, just about everything changes. Everything, that is, except for the need for fast, powerful, reliable backup and recovery solutions. Are you ready to usher your customers into the next era of systems and data protection? Sign up for our blog to keep on top of it.

Topics: Beginners/Introduction

symantec-approach-to-defending-advanced-threats