Select enterprise backup software


Published on

When assessing backup software vendors, IT leaders must avoid being taken in by flashy new features. Backup software should really be called restore software as failure in backup is failure to meet recovery objectives. Always evaluate features in light of these objectives.

Use this research to:

•Understand new features and develop a strategy to meet new challenges to enterprise backup, such as ever-increasing backup sizes, backup of virtual infrastructures, and evolving backup architecture strategy.
•Evaluate eight different backup software vendors for best fit using Info-Tech’s Vendor Landscape.
•Use Info-Tech’s scenario analysis to shortlist vendors according to your current situation and submit an RFP to vendors, score their responses, and prepare a backup software demo script.
•Assess implementation pitfalls in light of overall data management, security, and compliance requirements.
Ensure that you make the best-fit backup software decisions for enterprise availability and restore requirements, from strategy to selection to implementation.

Published in: Technology, Business
1 Comment
No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Select enterprise backup software

  1. 1. Select Enterprise Backup Software Meet recovery objectives while addressing modern challenges
  2. 2. Introduction One in four organizations fail to regularly evaluate alternatives to the software that backs up their mission critical data. However, recent developments – such as increased virtualization and expanding storage capacity requirements – have created new challenges for meeting restore objectives while minimizing costs. This research is designed for: This research will help you: <ul><li>CIOs and IT Managers </li></ul><ul><li>System Administrators </li></ul><ul><li>Business Continuity and Disaster Recovery Planners </li></ul><ul><li>Organizations increasing virtualization by 20% or more in the last or next 18 months </li></ul><ul><li>Organizations changing their backup architecture strategy </li></ul><ul><li>Understand how new challenges are impacting the traditional objectives of enterprise backup. </li></ul><ul><li>Assess the feasibility and desirability of switching to a new backup software provider. </li></ul><ul><li>Create a shortlist of backup software vendors and select which is the best fit. </li></ul><ul><li>Prepare an RFP, and score RFP responses. </li></ul><ul><li>Develop implementation plans that address common pitfalls. </li></ul>This solution set will provide a view into how current challenges are being met by vendors, to help you select the most appropriate alternative backup solution. Info-Tech Research Group
  3. 3. Executive Summary Info-Tech Research Group <ul><li>Nobody likes evaluating alternative backup software, but organizations that regularly assess their backup software against alternatives are just as successful as those that have just bought the next best thing. </li></ul><ul><li>It’s all about restore. Failure in backup is failure to meet recovery objectives. Always evaluate new features in light of these objectives. </li></ul><ul><li>Thirty-nine percent of organizations have recently implemented a new backup architecture, a perfect opportunity to consider alternative backup software. Backup software is only one part of the backup strategy as a whole. </li></ul><ul><li>Features abound, but it’s all about the restore. Deduplication and virtualization are areas of recent innovation for vendors, but ensure that the cost to add a feature is justified for the objectives that it helps to meet. </li></ul><ul><li>Develop an RFP and assess the vendor landscape. Use the associated RFP template and shortlist tool to document your requirements, score the responses, and refine your shortlist of vendors. </li></ul><ul><li>Assess your overall data management strategy before making your final selection, to ensure that data management, security, and compliance requirements can be met by the current solution. </li></ul>
  4. 4. Evaluate Implement Understand & Strategize <ul><li>The objectives of backup have not changed, but new features and functions help the enterprise meet new challenges to these traditional objectives. </li></ul><ul><li>Critical objectives of backup software are restore time objectives, restore point objectives, and restore granularity objectives. </li></ul><ul><li>New challenges include ever increasing backup sizes, backup of virtual infrastructures, and evolving backup architecture strategy. </li></ul><ul><li>Backup software is also only one part of a larger backup system. Meeting RTO, RPO, and RGO involves software, but also primary storage and backup target storage. </li></ul><ul><ul><li>Assess your backup and restore options and decide which </li></ul></ul><ul><ul><li>solutions are the best fits for your backup strategy </li></ul></ul><ul><ul><li>Enterprise Backup Software Select Roadmap </li></ul></ul>1
  5. 5. Backup is boring but too important to be ignored; regular backup review, including alternatives analysis, is critical <ul><li>Backup should be boring because it is a background activity that ensures the availability of foreground business-enabling IT services. It only becomes interesting if it fails. </li></ul>Organizations that regularly evaluate their backup software see more success, whether or not the analysis leads to a vendor change. Organizations currently evaluating have let an inefficient solution drive them to change. <ul><li>Don’t let a failure be your evaluation driver . An organization that assesses alternatives before serious issues arise can make more thorough assessments and more informed decisions. Organizations that fail to evaluate alternatives see their backup software degrade and are forced to look at new software regardless. </li></ul><ul><li>It’s not just about switching vendors, it’s about knowing your options. Evaluating alternate backup solutions and surveying available features and functionality is a good exercise and a healthy way to assess whether your current solution is still a good fit. </li></ul><ul><li>Be proactive. Complacency inevitably leads to unhappiness. When organizations make the “if it ain’t broke” assumption at the same time they make upgrades and changes to other areas of their infrastructure, their backup software eventually lags. </li></ul>Info-Tech Research Group <ul><li>See Appendix B for Success definition </li></ul>“ You should evaluate backup software annually to ensure that it meets the needs of the organization. - IT Manager, Mgmt Consulting Services ”
  6. 6. It’s about restore. Failure in backup is failure to meet recovery objectives; always evaluate features in light of these objectives <ul><li>It should be called restore software. Backing up data is a regular operational activity, so logically the software component of that activity is called backup software. But the goal of backup is data and system protection for business continuity and disaster recovery. Like buying insurance, the true value of a backup investment is only seen when it is needed, and what is needed is restore. </li></ul><ul><li>Meeting business objectives should be the ultimate measure of success . New features exist to minimize backup windows, minimize time to manage, and mitigate increases to storage and network capacity requirements. However, if you can’t restore the right data on time, then it’s all a failed exercise. </li></ul>The point in time to which systems and data must be recovered after an outage (e.g. end of previous day’s processing). The level of objects that can be easily recovered (e.g. a file, an e-mail, a SharePoint document, a directory, a mailbox, a hard drive, a full system image). Info-Tech Research Group Recovery Point Objective (RPO) Recovery Granularity Objective (RGO) The period of time within which systems, applications, or functions must be recovered after an outage (e.g. one business day). Recovery Time Objective (RTO) The value of any backup software is in how it helps the enterprise meet these critical objectives at best cost. Any feature or function of backup software that has no impact on meeting your recovery objectives, or the total cost of meeting those objectives, is of no value. Info-Tech Insight: “ [Our primary reason for changing software was] recovery time. In case of a disaster, every minute is of monetary importance. - IT Director, Healthcare ”
  7. 7. Backup infrastructures are changing; make sure the backup software component is keeping up with your backup strategy <ul><li>Tape isn’t dead yet, but almost two thirds of organizations have recently implemented or are considering new backup architecture options to house their mission-critical data. </li></ul>0 <ul><li>Out with the old & in with the new . If you’re purchasing new backup media, it’s often a great time to look into new software to fully leverage the benefits of your purchase. </li></ul><ul><li>Two birds with one stone. Upgrading your backup architecture? The time and resources required to integrate new backup media with old software may be offset by automation enabled by newer software. In many cases, the organizations that sell the hardware have partnerships with backup software providers that make integration much easier and reduce overall costs through bundling agreements. </li></ul>Interest in New Backup Architecture <ul><ul><li>Backup is not the same as e-mail archiving. For more on this topic see the solution set: </li></ul></ul>Select an E-Mail Archiving Solution Info-Tech Research Group “ <ul><li>So many companies starve their backup infrastructure until it becomes next to useless. </li></ul><ul><li>Three simple rules:  </li></ul><ul><li>Match the class of software to the environment. </li></ul><ul><li>Keep your backup software up to date. </li></ul><ul><li>Continue to enhance the architecture as performance/capacity needs increase. </li></ul><ul><li> - Daniel Giles </li></ul><ul><li> President, Sileg Consulting Inc. </li></ul>”
  8. 8. External public clouds are emerging as a legitimate backup target; look to how providers integrate cloud options <ul><li>Disk target options include disk arrays such as network attached storage (NAS) and arrays that present themselves on the network as virtual tape libraries (VTLs). </li></ul><ul><li>Cloud targets include targets for primary backup, and cloud targets for secondary data replication for offsite retention and building an archive. </li></ul>Disk has displaced tape as the dominant backup target media among those implementing new backup architectures. However, cloud options are gaining traction and are as popular as tape. Info-Tech Research Group Vendor Examples: Two Approaches to Leveraging Cloud Symantec has developed an extensive portfolio of cloud services ranging from cloud storage for Backup Exec to a full Software-as-a-Service backup solution (Symantec Online Backup). Symantec is also a full service cloud hosting provider (Symantec.Cloud). CommVault does not have its own cloud products but focuses on partner integration. Backup is managed to nearline (disk) storage for primary backup and fast restore, and then to a farline storage tier (disk, tape, or cloud) for offsite backup and archiving. Through integration partnerships with a range of cloud storage providers (Amazon, Rackspace, Nirvanix, and more), an external cloud target is managed just as tape or disk would be in this farline tier. 70% 60% 50% 40% 30% 20% 10% 0%
  9. 9. Where this solution set fits: backup software is one part of a storage infrastructure that ensures availability & recoverability Availability and recovery of systems and data are critical to overall IT service levels. Make sure that backup software integrates and works well with all aspects of the architecture. Other sets that address system/data availability and recovery Leverage Server Virtualization for DR Affordability and Agility Mitigate Costs & Maximize Value with a Best-Fit Backup Architecture Strategy Mitigate Costs & Maximize Value with a Consolidated Network Storage Strategy <ul><li>In servers , availability and recovery are boosted by component redundancy (NICs, Power Supplies) as well as clustering of multiple physical and virtual machines. </li></ul><ul><li>In primary storage consolidated in a SAN or NAS array, recovery is achieved through disk redundancy (RAID), built-in capabilities for data snapshots and volume replication, and by replication between arrays (to enable, for example, site to site failover capabilities). </li></ul><ul><li>In backup storage targets , recovery is aided by faster I/O, such as when disk is used instead of tape for random access read, which is significantly faster than sequential read. </li></ul>Very Broad Very Limited High Low Difficulty Meeting Objective Breadth of Media Support Meeting RPOs/RTOs/RGOs Backing Up Virtual Machines Controlling Impact on Storage/Network Source: Info-Tech Research Group N=57 Make sure that backup software supports, integrates, and works well with the new or improved architecture. Better meeting a recovery objective or lessening the impact of backup on the infrastructure may be impacted more by an architectural change than backup software, but the two go hand in hand. Availability and recoverability can be optimized at almost every system level. Info-Tech Research Group
  10. 10. On the backup software features front, virtual backup is an area where vendors are innovating 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Current & Projected Virtualization <ul><ul><li>For more on how virtualization changes the backup and recovery game, refer to the solution set: </li></ul></ul>Leverage Server Virtualization for DR Affordability and Agility 2011 is the year that most companies will have more than 50% of their infrastructure virtualized. Virtualization poses both opportunities and challenges for availability and recovery. When evaluating vendor offerings , look to how they are employing agentless backup, storage level snapshots, and APIs in the virtual infrastructure (such as VMware ) for fast, low overhead, virtual infrastructure backup. Info-Tech’s Advice Get the full benefit of virtualization. A virtual machine is a file. Backing up this file enables full system imaging snapshots and bare metal restores. But if traditional file backup is done within the VM, the activity misses the benefit of backing up the VM itself. <ul><ul><li>Virtual machines can perform backup like any other source device, by running an agent on the machine that backs up all the data on the machine. But running traditional backups on multiple VMs has a number of drawbacks: </li></ul></ul><ul><ul><li>Processor memory overhead requirements . Multiple VMs running multiple backup agents on a single physical server will quickly chew up processor cycles and memory. </li></ul></ul><ul><ul><li>Network bandwidth contention. Having multiple VMs running backup jobs on a single server can lead to contention for that server’s physical connection to the network. </li></ul></ul>Challenges Opportunity
  11. 11. Leverage data deduplication to lower cost of backup media through better utilization; vendors offer multiple dedupe methods <ul><ul><li>Data deduplication removes redundant read/write data blocks from data being backed up, and keeps an index of the removed redundancies so that the duplicate blocks can be put back in restore. </li></ul></ul>10 Gb <ul><ul><li>Target-based deduplication. Deduplication is done either as data is written to disk or tape (inline) or after the data is written in a second pass (post process). </li></ul></ul><ul><ul><li>The primary benefit is reducing the capacity requirements of the backup (e.g. disk-based targets are more cost effective because less disk is required). </li></ul></ul>Deduplication has been a rapidly evolving feature-set in backup over the past two years. Almost all vendors now have dedupe, but approaches differ: source, target, or both. 100 Gb Source Target <ul><ul><li>Source-based deduplication. Data is deduplicated at the source, typically by the backup agent running the backup from the server. </li></ul></ul><ul><ul><li>While this means more processing overhead to run the agent, the primary benefit is that less data is sent over the network to backup target. </li></ul></ul>10 Gb Network 10 Gb Info-Tech Research Group 100 Gb “ Features such as data dedupe and replication, if not supported by current backup software, should easily justify replacement to a new solution possessing those features. - IT Director, Manufacturing ” 100 Gb
  12. 12. Benefits of virtualization plus deduplication, when implemented correctly, are significantly greater than the sum of their parts <ul><li>Desktop Virtualization, an Optimal Case </li></ul><ul><li>Deduplication is most effective at storing and backing up virtual machines, particularly virtual desktops. Each virtual machine file contains both system data and personal data. Instead of storing the OS 50 times for 50 virtual machines, this information can be deduplicated so that the common system files are stored only once . </li></ul>Depending on the repetition level in the data sets being stored, deduplication can produce anywhere from a 2:1 to a 50:1 convergence ratio in the backup storage required. Before Deduplication OS File Storage: 12GB x 16 VMs = 192GB Unique File Storage: 2GB x 16 VMs = 32GB Total = 224GB OS File Storage: 12GB x 1 VM = 12GB Unique File Storage: 2GB x 16 VMs = 32GB Total = 44GB Claims of Heavy Convergence Some professionals in the industry have claimed as much as a 50:1 ratio in convergence and space saving capabilities in backup storage of virtual machines, although this can vary widely depending on the application. After Deduplication Deduplication Backing up 16 Virtual Machines Info-Tech Research Group
  13. 13. Don’t focus on the hype. Be sure to consider every relevant capability in evaluating alternatives Ability to manage, leverage primary storage arrays Support for multiple platforms Ability to leverage a range of target architectures Application awareness BMR has particular value for shortening restore times in disaster recovery scenarios. But restoring entire systems is more complicated than just restoring the files or data to a system. This is particularly complicated when a system is restored to hardware that has a different configuration than what the system was backed up from. Bare Metal Restore (BMR) Granular restore capabilities Architecture Integration Management This includes array-based snapshots, replication, and block-level change monitoring. Snapshots are particularly useful for reducing the impact of backups on availability. The snapshot is backed up leaving the primary data volume available to the application. Windows-based backup meets the largest share of enterprise backup needs, but ability to support multiple platforms such as Unix, Linux, and proprietary systems is a definite plus for heterogeneous data centers. On the virtual front, support for VMware should be a given, but support for Hyper-V and Citrix will become more desirable as desktop virtualization begins to take hold. Options are changing. Tape, public cloud storage, and disk arrays are all now legitimate targets. In addition to being certified to work with a given target, ability to integrate with target-side features such as built-in data deduplication can be a plus - but so can the ability to manage advanced functionality in the software attached to “dumb” hardware. Conducting backups for applications that must remain up and running 24x7 is a challenge for many organizations, especially for applications that can depend on large data sets, such as Microsoft SharePoint or Exchange. In particular, achieving restore granularity at the file, folder, and database level without requiring multiple steps to restore is not a feature offered by all vendors. Backup software plays a critical role in system availability and recovery but often restore granularity objectives are single file or record level. For example, how easy is it to restore a single file from a backed up virtual machine, or a single document from backed up SharePoint servers, or a set of records from a database server?
  14. 14. Medium-sized healthcare organization gets the most from its current solution by regularly piloting new features <ul><li>The IT group at this organization has been using the same backup software (CA ARCserve) for over ten years, making the indirect switching costs such as training, integration with legacy systems, and restoration of archived data prohibitive. </li></ul><ul><li>Over the years, the IT group has regularly piloted or implemented various optional add-on modules to their existing software to improve backup management and mitigate increasing demands on storage infrastructure. </li></ul><ul><li>All the while, the organization evaluates alternate vendor solutions, to ensure that their current software is up to par regarding their current needs and responding to modern changes to infrastructure, such as backing up VMs. </li></ul>A medium-sized healthcare organization regularly evaluates available backup features and functionality between its current vendor and other vendors to ensure currency and success. Info-Tech Research Group Key Standouts 10+ yrs Successful backup with the same vendor 0$ Vendor switching costs Multiple Pilots Trying new software capabilities kept organization current Case Study “ Backup software needs to change as technology evolves, business process recovery requirements change, and your former backup software no longer meets your needs. In addition, new backup software needs less manpower to achieve these needs. - IT Director, Business Services ”
  15. 15. Always analyze the costs & benefits of a given feature of backup software against availability & recovery objectives <ul><li>Example: Continuous Data Protection (CPD) </li></ul><ul><li>What is it? Method of continually tracking changes to data so that recovery can be made to any point in time (unlike, for example, snapshots which can only restore to the point in time of the snapshot). </li></ul><ul><li>Is CDP worth it? Depends entirely on the Restore Point Objective (RPO) of the data being stored. If losing hours or even minutes of rapidly changing data is deemed critically expensive, then CDP is a worthwhile investment. However, if data loss is tolerable within the range of hours or even days, CDP has little value. </li></ul><ul><li>How do we assess the value of the objective? Business impact analysis (BIA) uncovers the cost of data and time loss for the business. BIA should be a part of business continuity planning and can be leveraged to set RTO and RPO for data. </li></ul>The cost of achieving recovery objectives has to be balanced against the cost of failing to achieve objectives. Differentiate cool-to-have from must-have features. Info-Tech Research Group Refer to Info-Tech’s solution set, Right-Size Enterprise Disaster Recovery Plans and the OptimizeIT program, Business Impact and Risk Assessment to ensure backup software capabilities are in line with business requirements. Don’t waste cash on nice-to-haves when there are essentials left ill considered. Leverage Info-Tech’s research on disaster recovery & business impact analysis. The question “Can we afford this feature?” may well also be phrased “Can we afford this objective?” if meeting the objective is more expensive than potential loss from failure to meet the objective. Info-Tech Insight:
  16. 16. Simplification can enable savings. Complex licensing & management, plus maintenance/support, can drive up costs In traditional licensing models, you pay by the feature multiplied by the server agent with additional charges for application-specific agents to meet the particular requirements of database servers, or e-mail, or document management such SharePoint servers. Info-Tech Research Group Backup software licensing traditionally has been a complex affair where total cost is calculated per server agent with additional charges for advanced features and application awareness. <ul><ul><li>Premium Price for Premium Product </li></ul></ul><ul><ul><li>In reputational terms, CommVault gets frequent negatives from customers for the complexity and total cost of its licensing. “Love the software, hate the pricing” is a common refrain from CommVault users. HP Data Protector, on the other hand, has been aggressive on license pricing. </li></ul></ul>Caution: Maintenance Gotcha As with storage, hardware vendors will often lowball (discount) licensing to get the deal but lock the customer into high price maintenance contracts. Some organizations that have changed backup providers cite high support/maintenance costs as a motivation to switch. In product demonstrations, make sure you get value for money spent on maintenance/support. <ul><li>Look for options that reduce complexity by moving away from the by-feature and by-host multipliers. Opportunities for licensing simplification include: </li></ul><ul><ul><li>Solutions that include advanced features and functions in the base license. For example, IBM Tivoli and CA ARCserve have both included deduplication in their products at no additional charge. </li></ul></ul><ul><ul><li>Capacity-based licensing. In capacity-based licensing, cost is based not on the number of host servers protected, but by the total amount of storage backed up. Symantec and CommVault have added capacity-based licensing. (For more on the pros and cons of capacity-based licensing, see slide 41.) </li></ul></ul>“ We made the switch for a number of reasons. Maintenance costs of our previous solution were greater than the purchase price of our current solution. The previous solution used client-based licensing, our current solution is based on backup target capacities. Our current solution also integrates with our SAN storage leveraging snapshot capabilities to reduce backup times where our previous solutions couldn't . - Team Lead/Supervisor, Public Admin ”
  17. 17. IT services firm cut licensing costs by 30% and eliminated a full time position by switching backup software <ul><li>The IT group in a medium-sized IT services firm was experiencing unreliable restore processes and required a single FTE solely to manage their backup software on an ongoing basis. </li></ul><ul><li>While the organization could not justify switching costs in the past, it was in the process of changing its backup strategy – from disk-to-tape to disk-to-disk – making it an opportune time to consider alternate backup software. </li></ul><ul><li>, </li></ul><ul><li>Leveraging in-house expertise, the organization selected a backup solution – a combination of HP Data Protector and Microsoft Data Protection Manager – that integrated with existing hardware and provided a familiar user experience for IT staff, eliminating the need for a dedicated backup employee. </li></ul><ul><li>New licensing structure led to an annual savings of 30% in total costs of the backup software, making the improved functionality and integration of the backup software that much sweeter. </li></ul>A pending change in backup architecture strategy was a trigger for this organization to seriously consider alternative options for backup software Info-Tech Research Group Key Figures 1 FTP Reduction in staff 30% Annual licensing savings 1 Fewer user interfaces for IT to manage Case Study “ Backup software needs to change as technology evolves, business process recovery requirements change and your former backup software no longer meets your needs. In addition, new backup software needs less manpower to achieve these needs. - IT Director, Business Services ”
  18. 18. Evaluate Implement Understand & Strategize <ul><li>Evaluate eight different backup software vendors for best fit using Info-Tech’s Vendor Landscape. </li></ul><ul><li>Use Info-Tech’s scenario analysis to shortlist vendors according to your current situation with the Backup Software Vendor Shortlist Tool . </li></ul><ul><li>Use Info-Tech’s Backup Software RFP Template to solicit feedback on a set of consistent criteria. </li></ul><ul><ul><li>Assess your backup and restore options and decide which </li></ul></ul><ul><ul><li>solutions are the best fit for your backup strategy </li></ul></ul><ul><ul><li>Enterprise Backup Software Select Roadmap </li></ul></ul>2
  19. 19. <ul><li>There are a number of backup software vendors in the market, however, market share is generally dominated by Symantec, and to a lesser extent, EMC & IBM. </li></ul><ul><li>For this landscape, Info-Tech focused on those vendors that have a strong market presence and/or reputational presence among small to mid-sized Info-Tech clients. </li></ul>Backup Software Landscape inclusion criteria: market share, mind share, and solution diversity <ul><li>Included in the vendor landscape: </li></ul><ul><li>CommVault . Strong pure play vendor known for ease of integration, virtual backup, and ease of use that has respectable market share (8-10%) and has seen a recent surge in mind share. </li></ul><ul><li>Computer Associates (CA) . CA has a small market share and targets small and midmarket customers. Known for ease of setup and a strong partnership with VMware. </li></ul><ul><li>EMC . Has strong market share and a comprehensive portfoli0 through recent acquisitions of Data Domain (for deduplication, 2009) and Berkeley Data Systems (for public cloud backup, 2007). </li></ul><ul><li>HP . A feature rich offering that handles virtual environments better than most; its limited mind share as a standalone product means most implementations come from existing HP clients or bundled offerings. </li></ul><ul><li>IBM . Second in market share (15-20%) and increasing in that share of late, IBM has a highly scalable product and strong domain expertise. </li></ul><ul><li>Microsoft . While Microsoft does not have a strong market presence for backup software, it can be a good choice for small shops that have an exclusive investment in Microsoft. </li></ul><ul><li>NetApp/Syncsort . Known for its presence in the backup hardware space, NetApp has carved a niche in the market (~5% share) by partnering with Syncsort and leveraging its data protection capabilities. </li></ul><ul><li>Symantec . Market leader that has dominant market share (approx. 40%) with both its BackupExec & NetBackup offerings. Symantec is known for its strong developer support bringing enterprise features to SMB customers. </li></ul>Info-Tech Research Group
  20. 20. Symantec dominates mindshare, but CommVault, EMC, and IBM occupy the minds of the rest Microsoft 13% 17% 15% CA 5% CommVault IBM 14% EMC 10% 15% 10% 27% Symantec 31% 50% 25% Small (1-10 IT Staff) Medium (11-49 IT Staff) CommVault All Others EMC 15% 23% 57% 15% 0% NetApp Symantec Large (50+ IT Staff) <ul><ul><li>Survey respondents were asked to indicate which of the eight vendors in this landscape they had evaluated in the last 18 months. </li></ul></ul><ul><ul><li>Large-sized organizations look for vendors that cite scalability and performance, and solid support for heterogeneous environments as strengths. Given their high performance demands, varied application and data needs, and growing storage capacity requirements, these capabilities are crucial. </li></ul></ul><ul><ul><li>Small and mid-sized organizations value ease-of-use and management, as IT staff typically wear many hats. However, many mid-sized organizations utilize solutions typically thought of as large enterprise solutions because of their heterogeneous environment. </li></ul></ul>
  21. 21. Backup Software Evaluation Criteria & Weighting Factors g Product Evaluation Vendor Evaluation Product Vendor Management Architecture Integration Advanced Capabilities Support Capabilities Vendor Maturity Market Presence Info-Tech Research Group Virtual infrastructure backup, deduplication, and data management integration. Advanced Capabilities Integration with primary storage arrays, support for multiple targets, and multiple platform support. Architecture Integration Restore granularity, application awareness, and ease of use. Management Support avenues and domain expertise. Support Capabilities Product vision, portfolio breadth, and company size. Vendor Maturity Market share, mind share, and global reach. Market Presence
  22. 22. Backup Software Vendor Landscape category definitions For a complete description of Info-Tech ’ s Vendor Landscape methodology, and a comprehensive list of the evaluation criteria used, see Appendix B. Info-Tech Research Group Category Rating Definition Champion Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry. Competitor Competitors strike a strong balance between product and vendor attributes. They have the potential to become future industry leaders if they address the missing links in their product offerings. Emerging Player Emerging players are newer vendors who are starting to gain a foothold in the marketplace. They balance product and vendor attributes, but score lower relative to market Champions. Innovator Innovators have demonstrated innovative product strengths that act as their competitive advantage in appealing to niche segments of the market. Industry Standard Industry standard vendors are well established players with very strong vendor credentials, but with more average product scores.
  23. 23. Backup Software Vendor Landscape
  24. 24. Backup Software Vendor Scorecard <ul><li>Note: “Harvey Ball” scores are produced by normalizing weighted scores for each category, resulting in rankings for each category. </li></ul><ul><ul><li>For example, an empty circle does not indicate a zero score; it indicates the lowest score in that category relative to the other products . </li></ul></ul>Legend: Info-Tech Research Group Product Vendor Architecture Integration Advanced Capabilities Management Maturity Support Capabilities Market Presence CommVault Symantec EMC IBM CA NetApp/Syncsort HP Microsoft = 0 = 1 = 2 = 3 = 4
  25. 25. CommVault Simpana offers ease of use and broad platform and virtualization support “ We have integrated all the components into a completely integrated approach that starts with a single policy at the top, extends through the array/snapshot layer, drives deduplicated data to the various end points, and finishes out in the cloud…Providing flexibility and mixing and matching to fit the best use-case is always a hallmark of the Simpana platform strategy. ” -CommVault Champion Solution: Simpana Employees: 1300 Headquarters: Oceanport, New Jersey Website: Founded: 1996 Presence: NASDAQ: CVLT FY10 Revenue: $271.0M Strengths <ul><li>CommVault has a strong reputation for customer support. It’s one of the few companies whose solution is developed entirely in-house and from a common code base; the company knows its product well. </li></ul><ul><li>A recent Info-Tech survey indicates that Simpana is viewed as the easiest solution to use, supporting CommVault’s position as a unified solution viewable through a single pane of glass; recent developments include source deduplication, script-free snapshot control, as well as scheduling and management of snapshots. </li></ul><ul><li>Simpana supports a wide array of OS and virtual platforms, making it a good fit for both homogeneous and heterogeneous environments. </li></ul><ul><li>Migration tools to reduce complexity of moving from competitor products. </li></ul>Challenges <ul><li>CommVault has made great strides recently in developing mind share, but its challenge will be to convert that to further market share in 2011. </li></ul><ul><li>Info-Tech has received feedback in the last six months that CommVault’s licensing structure is confusing and pricing is higher than competitors; however, its recent introduction of capacity-based pricing and capacity management & monitoring tools may help rectify this issue. </li></ul>Info-Tech Insight CommVault has made recent strides in market share growth by enabling improved transition from other solutions, offering automatic conversion of legacy backup agents to Simpana agents, and auto-discovery & set-up of VMs. According to an Info-Tech survey, more than half of organizations looking at CommVault are large enterprises, where Simpana was one of the top two solutions considered (23% of the time). CommVault customers were also most likely to meet RPOs & RTOs.
  26. 26. Symantec is the 800-pound gorilla that brings enterprise capabilities to SMEs “ Some people like sports cars and some people like sports utility vehicles. Other vendors might try to sell you a four-wheel drive Ferrari or something that is some sort of hybrid of the two, and what you end up doing is not getting the best of either. What we’ve done with Backup Exec and NetBackup is to split them and to say we’re gonna have the very best sports utility vehicle and the very best sports car. ” - Symantec Champion Solutions: Backup Exec & NetBackup Employees: 17,500+ Headquarters: Mountain View, California Website: Founded: 1982 Presence: NASDAQ: SYMC FY10 Revenue: $6.0B Strengths <ul><li>Symantec’s strong developer support (1000+) allows it to extend enterprise features to SMB customers. </li></ul><ul><li>Both solutions offer exceptional integrated deduplication and integrated archiving to fill out Symantec’s already comprehensive offerings. </li></ul><ul><li>Provides granular and flexible virtual restore functionality in VMware (solutions can look inside VMDK and .vhd files using FlashBackup to crack open files) and presents as both file-based & image-based backup, simultaneously eliminating a multi-step restore process. </li></ul><ul><li>To simplify deployment & management of backup & deduplication technology, Symantec offers appliances with both client & media server deduplication in one package. </li></ul><ul><li>In an Info-Tech survey, Symantec customers were most successful in monitoring & reporting on their backup environment among their peers. </li></ul>Challenges <ul><li>Info-Tech clients have expressed concern over Symantec’s quality of customer service and support, which was supported by Info-Tech’s survey where Symantec scored lowest among its peers in this regard (69% of clients cited as “satisfied”). </li></ul>Info-Tech Insight Symantec’s Backup Exec is designed for homogeneous Windows environments and has strong deduplication functionality, taken in part from its counterpart, NetBackup. NetBackup is suited to organizations with diverse, data center focused environments providing broad application support. While Symantec’s Backup Exec and NetBackup solutions are seen as SMB and large enterprise options respectively, Info-Tech’s recent survey suggests NetBackup is equally popular in large and medium organizations.
  27. 27. CA offers ease-of-use, advanced monitoring features, and strong virtual infrastructure management “ The CA ARCserve Family of Products provides integrated easy-to-use tools and innovative technology so customers get a complete strategy to manage backup, recovery, and availability of their applications, data and systems to keep their entire physical and virtualized environment highly available .” - CA Competitor Solution: ARCserve Employees: 13,200 Headquarters: Islandia, New York Website: Founded: 1976 Presence: NASDAQ: CA FY10 Revenue: $4.4B Strengths <ul><li>ARCserve is developed primarily in-house, making CA extremely knowledgeable of its product. </li></ul><ul><li>ARCserve has been described by Info-Tech clients as easy to use, set up, and manage, with standout dashboarding, reporting, and infrastructure visualization capabilities. </li></ul><ul><li>CA has a strong partnership with VMware, resulting in very effective virtual backup capabilities and functionality, especially with regards to ease of management. CA is among market leaders in this regard. </li></ul><ul><li>Application awareness is a strength, with excellent restore granularity for Active Directory and SharePoint. </li></ul><ul><li>Target deduplication is offered as part of its standard offering. </li></ul><ul><li>CA leveraged its 2006 acquisition of Xosoft to deliver a family of products, including D2D, Replication, and High Availability offerings, available individually or together as a complete solution. </li></ul>Challenges <ul><li>Info-Tech clients have described customer support as a concern in the past as CA has relied on the channel, but have stated that support has improved significantly over the last year. </li></ul><ul><li>ARCserve does not offer source-side deduplication. </li></ul>Info-Tech Insight The CA ARCserve family of products is primarily targeted at the SME market, with a strong foothold in Europe. The products are designed to be easy to use, resource efficient, cost effective, and flexible to meet the needs of the small enterprise, where IT may not have spare time and workforce to devote to administrating backup software.
  28. 28. EMC brings dominant deduplication capabilities to leading storage hardware Competitor Solutions: Avamar & NetWorker Employees: 48,500 Headquarters: Hopkinton, Massachusetts Website: Founded: 1979 Presence: NASDAQ: EMC FY10 Revenue: $17B Strengths <ul><li>Far and away the market leader in consolidated storage hardware, EMC’s backup software integrates well with its proprietary primary storage array technology. </li></ul><ul><li>Broad OS and virtual platform support among market leaders in this regard, with especially good support for VMware. </li></ul><ul><li>EMC augmented its already strong deduplication capabilities through acquisition of Data Domain (2009) and is currently the market leader in this regard, offering source deduplication as part of its Avamar and NetWorker solutions and target-based deduplication through its Data Domain appliances. </li></ul><ul><li>EMC also offers Avamar Data Store, a preconfigured appliance shipped with Avamar software that boasts easy onsite setup and simplified deployment and management, and Avamar Virtual Edition for VMware, a fully virtualized backup and recovery solution that simplifies management of virtual machine backup. </li></ul>Challenges <ul><li>While EMC’s products can be deployed individually, this modularity means that solutions cannot all be managed through a single interface. This can be a challenge for Info-Tech’s customers as they try to do more with less and manage their backup environment with a less-skilled workforce. </li></ul><ul><li>Maintenance costs have also been expressed as a concern by Info-Tech clients. </li></ul>Info-Tech Insight EMC’s Avamar solution is targeted at mid-sized and large enterprises with particular strength in data reduction, making it a good fit for VMware environments, remote offices, and LAN/NAS servers. EMC’s NetWorker backup software is a highly scalable solution targeted to large-sized organizations with heterogeneous enterprise platforms and application requirements.
  29. 29. HP offers low-cost backup software with HP products as strong integrators Competitor Solution: Data Protector Employees: 304,000 Headquarters: Palo Alto, California Website: Founded: 1939 Presence: NASDAQ: HPQ FY10 Revenue: $126B Strengths <ul><li>HP offers an affordable price and claims they can save customers up to 70% over competitive solutions. </li></ul><ul><li>Data Protector’s primary strength is ease of integration with HP hardware, putting it at the top of the shortlist for HP shops. </li></ul><ul><li>HP Manager of Manager (MoM) creates a highly scalable Data Protector backup environment that includes hundreds to thousands of Disk Agents and Media Agents. This allows for setting of corporate policies and monitoring from a central point, while enabling control of each remote site to remain in the hands of local administrators. </li></ul><ul><li>HP offers automated scripting, simplifying ongoing management of the backup environment. </li></ul><ul><li>HP offers strong API-level integration for applications and storage, which simplifies backup management and provides greater resilience to disruptions in customer environments. </li></ul><ul><li>HP has a great global support and services network. </li></ul><ul><li>Data Protector’s virtual infrastructure capabilities are on par with current market leaders. </li></ul>Challenges <ul><li>HP’s current challenge is that it holds limited mind share in the enterprise backup software market. A recent  Info-Tech survey indicates that 8% of organizations looking at alternate backup software considered Data Protector. </li></ul>Info-Tech Insight HP’s global reach and name brand recognition would seem to suggest a greater share in the backup software market. However, DataProtector seems to have had difficulty expanding outside of HP’s existing client base. Its strong integration with its own product line is certainly a strength for IT shops, but its limited support of different OSs may keep it from reaching a wider audience.
  30. 30. IBM brings scalability and a comprehensive feature set as a standard offering “ W e improved our scalability, availability and performance…[and] we introduced built-in data deduplication. So it’s free of charge. Both server and client side duplication are supported by TSM, so either source or target have pre-processing, depending on what you need. [We] simplified the management by introducing a whole new admin center that can run and manage either TSM as a standalone or with our other products within our portfolio .” - IBM Competitor Solution: Tivoli Storage Manager (TSM) Employees: 399,000 Headquarters: Armonk, New York Website: Founded: 1924 Presence: NASDAQ: IBM FY09 Revenue: $95.8B Strengths <ul><li>The most recent release of TSM brings improved scalability to an already highly scalable product. With DB2 as the TSM internal database, a single TSM server can scale to manage billions of objects. </li></ul><ul><li>IBM has a very good global support and services network and strong domain expertise, as well as major market share. </li></ul><ul><li>TSM provides adequate data reduction features that include source and target deduplication, as well as compression, progressive/block-level incremental, and very good support for virtual infrastructure backup. </li></ul><ul><li>IBM offers very broad support for a variety of OSs, on hardware ranging from servers to mainframes. </li></ul>Challenges <ul><li>IBM has been late to market on support for backing up virtual infrastructure; however, the current capabilities of TSM are quite good with improved VMware integration. </li></ul><ul><li>While IBM has made recent efforts to improve usability and simplify management, it still faces difficulty overcoming perception as being difficult to manage. </li></ul>Info-Tech Insight While IBM is typically thought of as a large enterprise offering, a recent Info-Tech survey indicated that 27% of mid-sized organizations had considered IBM when looking for alternative backup software. IBM customers were also found to be the most confident that their mission-critical data was completely secure, relative to organizations using other solutions.
  31. 31. Microsoft offers basic but affordable functionality for Microsoft clients Competitor Solution: Data Protection Manager Employees: 89,000+ Headquarters: Redmond, Washington Website: Founded: 1975 Presence: NASDAQ: MSFT FY09 Revenue: $62.5B Strengths <ul><li>Microsoft’s Data Protection Manager’s (DPM) biggest strength might be it’s strong application awareness for Exchange, SharePoint, SQL Server, and other Microsoft applications. </li></ul><ul><li>DPM is a very cost effective option for organizations with significant investment in Microsoft. </li></ul><ul><li>While DPM is really geared toward smaller Windows-only shops, it scales reasonably well, with a DPM server capable of backing up 100 servers, </li></ul><ul><li>Because DPM is primarily deployed by Microsoft shops, and DPM is part of the Windows Server System, IT administrators are already familiar with the interface making setup and maintenance relatively simple and requiring minimal training. </li></ul>Challenges <ul><li>Microsoft does not offer deduplication as part of their backup software which has become a standard offering for backup over the last 12 months. </li></ul><ul><li>DPM’s backup and restore functionality for virtual environments is also rather basic and does not offer support for non-Microsoft virtual platforms – difficult given VMware and Citrix’s leading positions in the virtualization market. </li></ul>Info-Tech Insight When compared to other backup software solutions, Microsoft’s DPM seems very limited in its capabilities. However, there are many IT shops that will find DPM to be a good fit in their environment. Info-Tech recommends DPM for small to medium shops that already have a significant investment in Microsoft – both on the server and the end user side. Other shops may look to DPM to manage the MSFT side of the house and integrate it with another solution for the rest of the environment.
  32. 32. NetApp’s partnership with Syncsort results in a unique solution with minimal backup windows “ It’s not just about efficiency, it’s about eliminating the backup window… Only move the data that you absolutely have to. ” - NetApp Competitor Solution: NetApp Syncsort Integrated Backup Employees: 8,000+ Headquarters: Sunnyvale, California Website: Founded: 1992 Presence: NASDAQ: NTAP FY10 Revenue: $3.93B Strengths <ul><li>Ease of use and integration is standout in NetApp Syncsort Integrated Backup (NSB), even in heterogeneous environments. </li></ul><ul><li>While primarily known for primary storage, NetApp provides a unique approach that minimizes backup windows through snapshots and replication, allowing minimal data to be taken from a production environment at a time. </li></ul><ul><li>Powerful partnership. In the past Info-Tech has found Syncsort Backup Express (BEX) to be a solid contender that was not well enough known. </li></ul><ul><li>All backups are in native (not proprietary ) format and a full catalog spans disk & tape for wildcard search and restore. </li></ul><ul><li>NSB conducts replication at the block level and eliminates media servers as intermediaries between sources & targets. </li></ul>Challenges <ul><li>Overall, virtual backup capabilities are good, but not a standout for NSB. However, it does offer exceptional virtual restore capabilities and can create a bootable VM for RTO of minutes from any backup image. </li></ul><ul><li>NetApp is still relatively unknown in the backup software market as NSB was only released as a joint backup solution in September 2010. NSB will have to be more widely tested and proven before the market can decide what direction this product will take. </li></ul>Info-Tech Insight NetApp was positioned as a Champion in Info-Tech’s solution set, Select a Consolidated Storage Platform . NetApp has been working well for many mid-sized enterprises that are consolidating and virtualizing storage. NetApp Syncsort Backup shows some serious promise in simplified backup management. The challenge will be to prove that they can deliver in both markets in a hardware-software pairing.
  33. 33. Out of scope does not imply inferiority. Consider whether these more specialized vendors meet your backup needs <ul><li>As backup software has matured, most pure play vendors that offered niche offerings – such as deduplication – have been swallowed up by larger companies. </li></ul><ul><li>Virtual backup is the exception. Virtual backup-only vendors emerged as organizations with legacy backup developed larger virtual infrastructures that necessitated more sophisticated management software. </li></ul><ul><li>As organizational infrastructure becomes more virtualized, using virtual backup-only vendors as supplements to backup software becomes a serious consideration, especially for organizations where switching comes with prohibitive costs or compliance hurdles. </li></ul>Virtual Infrastructure Backup Vendors Cloud Backup Providers <ul><li>Cloud Storage is not being heavily adopted yet, mostly due to the increased bandwidth required to back up straight to the cloud. </li></ul><ul><li>With virtually no upfront costs, however, it may be appropriate for small shops with smaller, infrequently changing databases. </li></ul>Info-Tech Research Group Service Description <ul><li>Online backup pioneer which has morphed into a cloud backup provider. </li></ul><ul><li>Cloud backup provider that is now owned by EMC. </li></ul>Vendor Description <ul><li>Through partnership with VMware, Veeam provides virtual infrastructure management, primarily for small enterprises. Veeam does, however, have plugins for HP & Microsoft enterprise management consoles. </li></ul><ul><li>Using virtual backup appliances (virtual machines backing up virtual machines), PHD Virtual offers virtual backup options for both Citrix and VMware. </li></ul><ul><li>Vizioncore’s vRanger was the first-to-market virtual backup-only vendor in the space, was acquired by Quest software in 2008, and provides virtual backup to VMware only. Quest recently acquired BakBone Software, strengthening Quest’s data protection capabilities. </li></ul>
  34. 34. It’s not all in the rankings: understanding your situation can be the best way to develop a shortlist Info-Tech Research Group If You Are... Then Consider… An organization that can afford limited or no time for backup windows. NetApp Syncsort Express An organization that relies on a homogeneous Windows environment with little reliance on Linux or proprietary platforms. Microsoft, Symantec BackupExec An organization with a larger, diverse infrastructure. Symantec NetBackup, CommVault Looking to reduce management complexity and bolster ease of use with a single pane of glass. CA, CommVault, NetApp Invested to a large degree with IBM, EMC, or HP hardware. IBM, EMC, HP respectively Relying on a highly virtualized environment. Symantec (VMware only), CommVault, CA, EMC, HP, IBM Utilizing heavy production workloads that rely on Apple Mac OS X. CA, EMC, IBM, Symantec Unhappy with your current backup software’s handling of virtual backup, but don’t want to completely change backup software. Quest, Veeam, PHD Virtual
  35. 35. Identify leading solution candidates with the Backup Software Vendor Shortlist Tool <ul><ul><li>The Info-Tech Backup Software Vendor Shortlist Tool is designed to </li></ul></ul><ul><ul><li>generate a customized shortlist of vendors based on key priorities. </li></ul></ul><ul><ul><li>The Backup Software Vendor Shortlist Tool offers the ability to modify: </li></ul></ul><ul><ul><ul><ul><li>Overall Vendor vs. Product weightings </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Vendor criteria weightings (e.g. vendor maturity, support capabilities, market presence) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Product criteria weightings (e.g. architecture integration, advanced features, management) </li></ul></ul></ul></ul><ul><ul><li>Use this tool at an early stage of analysis to identify vendors that will best meet business requirements. </li></ul></ul>Info-Tech Research Group
  36. 36. Issue an RFP to ensure the vendor fits your needs and not the other way around <ul><li>Issuing an RFP is a critical step in your vendor selection process. </li></ul><ul><li>Info-Tech’s Backup Software RFP Template is populated with critical elements including: </li></ul><ul><li>The Statement of Work </li></ul><ul><li>Proposal Preparation Instructions </li></ul><ul><li>Scope of Work </li></ul><ul><li>Specifications & Requirements </li></ul><ul><li>Vendor Qualifications & References </li></ul><ul><li>Budget & Estimated Pricing </li></ul><ul><li>Vendor Certification </li></ul>Info-Tech Research Group
  37. 37. To get the most value out of the RFP process, use the Backup Software RFP Scoring Tool <ul><li>Use Info-Tech’s Backup Software RFP Scoring Tool to evaluate RFP responses. The tool is prebuilt with essential criteria and complements the Backup Software RFP Template . </li></ul><ul><li>Use the tool to drive the selection meeting with your procurement department. </li></ul>Info-Tech Research Group <ul><ul><li>A standard and transparent process for scoring individual vendor </li></ul></ul><ul><ul><li>RFP responses will help ensure that internal team biases are minimized. </li></ul></ul>Pricing information can bias business and technical reviewers and distract their attention from evaluating business and technology requirements. Consider withholding vendor pricing information from evaluators until after functional criteria have been fully evaluated. Info-Tech Insight:
  38. 38. Take charge of vendor finalist demonstrations with the Backup Software Vendor Demonstration Script <ul><ul><li>The Info-Tech Backup Software Vendor Demonstration Script is designed to provide vendors with a consistent set of instructions for key scenarios. </li></ul></ul><ul><ul><li>This template includes examples for the following scenarios: </li></ul></ul><ul><ul><ul><li>Implementation </li></ul></ul></ul><ul><ul><ul><li>Configuration </li></ul></ul></ul><ul><ul><ul><li>Restore Granularity Capabilities </li></ul></ul></ul><ul><ul><ul><li>Backup & Restore of Virtual Infrastructure </li></ul></ul></ul><ul><ul><ul><li>Deduplication Compression & Speed </li></ul></ul></ul><ul><ul><li>Modify this demo script template to fit your individual needs and requirements. </li></ul></ul><ul><ul><li>An onsite product demonstration will help enterprise decision makers better understand the capabilities & constraints of various solutions. </li></ul></ul>Info-Tech Research Group
  39. 39. Evaluate Implement Understand & Strategize <ul><li>Consider broader data management issues related to implementing new backup software. </li></ul><ul><li>Rate vendor responses with the Backup Software RFP Scoring Tool . </li></ul><ul><li>Take charge of demonstrations with the Backup Software Vendor Demonstration Script . </li></ul><ul><ul><li>Assess your backup and restore options and decide which </li></ul></ul><ul><ul><li>solutions are the best fits for your backup strategy </li></ul></ul><ul><ul><li>Enterprise Backup Software Select Roadmap </li></ul></ul>3
  40. 40. It’s not all skittles and rainbows: consider benefits of new software against the broader canvas of enterprise data management & protection <ul><li>Know the issues. Capacity-based licensing, data deduplication, and improved backup and recovery times with a new solution all have negative counterparts. Consider Info-Tech’s scenarios on the next three slides that outline potential challenges around: </li></ul><ul><ul><li>Implications of capacity-based licensing for archiving and virtualization strategy. </li></ul></ul><ul><ul><li>Aligning data encryption requirements with data deduplication capabilities and strategy. </li></ul></ul><ul><ul><li>Future recovery obligations , for example, compliance for legacy backups. </li></ul></ul>Info-Tech Research Group In addition to fitting with broad availability & recovery hardware architectures, backup software needs to fit with broader data management, security, and compliance objectives. “ Backup Administrators should be concerned about building a[n overarching] backup solution where backup [software] has a role. Administrators have to get away from just looking at their backup up software and start looking at their overall backup strategy. - Backup Storage Engineer, Healthcare ”
  41. 41. Capacity-based licensing is not for everybody but it can lower complexity and fit into broader data management practices Capacity-based licensing holds the promise of a simpler and cheaper licensing model. It also can be leveraged to support better data management practices. Info-Tech Research Group <ul><li>Traditional licensing is by server, in addition to charges for application-aware backup agents (for example, Microsoft Exchange) as well as new functions (such as deduplication). </li></ul><ul><li>Capacity-based licensing is based on the amount (per TB) being backed up. The number of servers is no longer a multiplier. </li></ul><ul><li>Benefits of capacity-based licensing include: </li></ul><ul><li>Greater simplicity in license management , particularly if there are many servers and applications being protected. </li></ul><ul><li>Size and complexity of the server infrastructure does not drive costs , but rather the total amount of data being backed up. Regular backup of one 1 TB of data from 10 servers will theoretically cost the same as regular backup of 1 TB from 30 servers. </li></ul><ul><li>Up to 50% savings are claimed by vendors as their customers have moved to capacity-based licensing. </li></ul>Capacity-based licensing benefits those with many applications and servers to be protected but relatively modest total data to be backed up. Enterprises with very large data stores that need to be protected but more modest numbers of servers don’t fit this model. Virtual infrastructures can be a problem for capacity-based licensing because it focuses on actual data being backed up. For example, in a 10 Terabyte SAN with only 1 TB of data stored, the licensing is for 1 TB. In virtual infrastructures, the virtual hard drive is a file. So a 1 TB virtual hard drive might be a 1 TB file to be backed up even if the virtual hard drive only has 100 GB of data stored on it. Leverage capacity-based licensing for cost justification for better data management and storage tiers. Archiving proponents argue that up to 70% of data subject to backup is unchanged and should not be in primary storage but rather in an archive. Capacity-based licensing exposes the cost of backup by data volume, reducing the volume reduces the cost of backup. Capacity licensing should also incorporate some overhead for expected data growth. Pitfall #1 Recommendation Pitfall #2
  42. 42. Make sure a data reduction strategy is compatible with efforts to secure the data <ul><li>Data security is becoming ever more crucial. Securing enterprise data is an increasingly important task as lines between private and public domains are blurred and the public cloud becomes a more viable backup target. </li></ul><ul><li>Data is the family jewels of the organization. Encrypting data in storage is an important means of protecting this valuable commodity, particularly in cases where the data container moves outside of the organization; for example, when tapes are moved to an offsite location or when private corporate data is stored on a multi-tenant public cloud. </li></ul><ul><li>Data encryption can frustrate goals to reduce capacity requirements. While protecting data is critically important, so is reducing the cost of storing the data. Deduplicating data can dramatically reduce storage requirements but encryption can pose a serious problem for deduplication. </li></ul>Ensure potential backup software can play nice with your encryption strategy. Info-Tech Research Group Deduplication scans data for duplicate blocks of storage and replaces the duplicates with an indexed reference hash value. Encryption scrambles data at the block level - making each block unique. Encrypted blocks cannot be deduplicated because there is no duplication. Deduplication must precede encryption. If the data is deduplicated either at the source or on the way to the target (inline) and encrypted before it is written to disk or tape (or sent to the cloud), then encryption and deduplication objectives can be met. <ul><ul><li>Investigate the data deduplication methodology of the proposed solution to make sure it is compatible with current encryption procedures, if any. For example, seek certification information on whether a backup vendor’s deduplication works with a target hardware provider’s target-side encryption. </li></ul></ul><ul><ul><li>2. Look to how the backup solution provider integrates its backup solution with other data management software such as data encryption. Having encryption and deduplication as part of an integrated solution will ensure the two play nice and may simplify management through a single console. </li></ul></ul>Problem Recommendations Solution
  43. 43. Ensuring future recovery capabilities for legacy backups is a major impediment to switching backup software Info-Tech Research Group Leverage retention and recovery obligations to argue for upgrading current backup software to meet new requirements while protecting past investment through backward compatibility. Consider investing in a data archiving strategy . Archiving isn’t about saving everything, it’s about determining what can be safely disposed of and when. If everything is on old tapes, that may be a ticking liability time bomb. Explore alternatives to maintenance of a legacy backup system. For example, a forensic audit service could supply the capability to retrieve old data from legacy media (tapes, disks) in the case of a legal requirement to do so. Two example providers are Iron Mountain and Altirium . Recommendations Recovery objectives serve business continuity goals, but they also serve legal and compliance goals for enterprise data. Availability of legacy backups can be a ball & chain holding back change. Dollar cost is not as big of [a] concern as the time cost to make the change, and maintain both systems to stay in compliance per regulations. -CISO, Business Services The overall problem with any transition is the cost of equipment and the issue about how to handle long term retention of data. Data backup on one backup software cannot be migrated from one software to another. Usually a costly restore to a system has to be performed followed by a backup. -IT Manager, Healthcare For us, the main reason not to switch is compliance. We are required to retain data for 7-10 years and some are 30+ years. To switch vendors then we would need to keep our old software environment up for restores so why manage two different solutions and have costs associated with both. -Network Admin, Financial “ “ The cost to maintain two backup systems, one for the new backup software and one to ensure recoverability of old backups to meet legal and regulatory compliance, is an often cited reason for those not switching solutions. Clearly establish RPOs & RTOs of legacy backup data. The cost of any solution’s continuance is the cost of meeting these objectives. The degree of this problem is driven by the legacy data availability and recovery objectives of the organization. Organizations with long mandated retention periods and rapid recovery time objectives find this aspect particularly challenging. Problem Solution
  44. 44. Conclusions <ul><li>Evaluate your current backup software at least once per year to ensure enterprise backup meets recovery and availability requirements. </li></ul><ul><li>Consider the benefits that new technology can bring as your environment becomes more virtualized and storage capacity requirements increase. </li></ul><ul><li>However, remember that restore reigns supreme. Carefully consider the benefits of new features against availability and recovery requirements. </li></ul><ul><li>CommVault and Symantec lead the pack, but for different reasons. CommVault offers ease of use and management through automated scripting, broad media support, and exceptional service. </li></ul><ul><li>Symantec offers solutions created by an army of developers and is accessible to the little guy, with easy implementation and management through packaged appliances. </li></ul><ul><li>That said, complexity, size, existing infrastructure, and recovery objectives should be the primary indicators of a best-fit solution. </li></ul><ul><li>Backup has to fit into the overall data strategy. Look at the big picture before making a final decision to ensure all aspects are covered. Backup and restore functionality influences many areas of the infrastructure. </li></ul><ul><li>Seize the opportunity that evaluating backup software brings to evaluate the ways in which you can leverage that software to improve ongoing data management. </li></ul>Understand & Strategize Evaluate Implement
  45. 45. Appendix A: Survey Demographics
  46. 46. Industry
  47. 47. Revenue
  48. 48. Job Title
  49. 49. Current Situation
  50. 50. Appendix B: Aggregate Measures
  51. 51. Enterprise Backup Success <ul><li>Enterprise Backup Success was calculated as an aggregate of respondents’ ratings of their success in the following: </li></ul><ul><li>My organization can restore data within target RTOs/RPOs. </li></ul><ul><li>My organization can restore data with Restore Granularity Objectives (RGOs). </li></ul><ul><li>My organization’s mission critical data is completely secure. </li></ul><ul><li>My IT group monitors and reports on its backup environment at least monthly. </li></ul><ul><li>My organization leverages the complete feature set and functionality of our backup software. </li></ul><ul><li>Our TCO per TB per year for our backup software is within an acceptable range. </li></ul>Info-Tech Research Group
  52. 52. Enterprise Backup Software Satisfaction <ul><li>Enterprise Backup Software Satisfaction was calculated as an aggregate of respondents’ ratings of their satisfaction with the following features of their backup software (if used/available): </li></ul><ul><li>Overall Cost </li></ul><ul><li>Ease of Use </li></ul><ul><li>Ongoing Support </li></ul><ul><li>Recovery Granularity </li></ul><ul><li>Broad Media Support (i.e. tape & disk) </li></ul><ul><li>Meeting Application-Specific Requirements (e.g. SharePoint, SQL, Exchange) </li></ul><ul><li>Virtual Machine Backup Options & Functionality </li></ul><ul><li>Deduplication Features & Functionality </li></ul><ul><li>Completeness of Public Cloud Backup Options </li></ul>Info-Tech Research Group
  53. 53. Info-Tech Research Group Info-Tech Research Group ’ s Vendor Landscape market evaluations are part of a larger product selection solution set, referred to as a “Select Set.” The Vendor Landscape evaluation process starts with a customer survey. Customers tell us which vendors and products they have heard of and which ones they use, plan to use, or are investigating. From these survey results and the domain experience of our analysts, a vendor/product shortlist is established. Product briefings are requested from each of these vendors, asking for information on the company, products, technology, customers, partners, sales models, and pricing. Our analysts score each vendor and product across a variety of categories. These scores are then weighted according to weighting factors our analysts believe represent the weight that an average client should apply to each criteria. The weighted scores are then averaged for each of two high level categories: vendor score and product score. A plot of these two resulting scores is generated to place vendors in one of five categories: Champion, Competitor, Emerging Player, Innovator, and Industry Standard (see below). Info-Tech Vendor Landscape Methodology Category Rating Definition Champion Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry. Competitor Competitors strike a strong balance between product and vendor attributes. They have the potential to become future industry leaders if they address the missing links in their product offerings. Emerging Player Emerging players are newer vendors who are starting to gain a foothold in the marketplace. They balance product and vendor attributes, though score lower relative to market Champions. Innovator Innovators have demonstrated innovative product strengths that act as their competitive advantage in appealing to niche segments of the market. Industry Standard Industry standard vendors are well established players with very strong vendor credentials, but with more average product scores.
  54. 54. Info-Tech Research Group We then take the individual scores for each vendor/product in each evaluation category and normalize them to a scale of 0 to 4. This produces a relative scoring, where a low score value indicates low performance in that category relative to the performance of the other products in that category and vice versa for a high score . These normalized scores are represented with “Harvey Balls,” ranging from an open circle for a score of zero and a filled circle for a score of 4. Harvey Ball scores do not represent absolute scores , only relative scores. Individual scorecards are then sent to the vendors for factual review and to ensure no information is under embargo. We will make corrections where factual errors exist (e.g. pricing, features, technical specifications). We will consider suggestions concerning benefits, functional quality, value, etc.; however, these suggestions must be validated by feedback from our customers. We do not accept changes that are not corroborated by actual client experience or wording changes that are purely part of a vendor ’ s market messaging or positioning. Any resulting changes to final scores are then made as needed, before publishing the results to Info-Tech clients. Vendor Landscapes are refreshed every 12 to 24 months, depending upon the dynamics of each individual market. Info-Tech Vendor Landscape Methodology (continued)
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.