SlideShare a Scribd company logo
1 of 7
Download to read offline
Agentless Backup is
Not a Myth.

Contents
Agentless Backup is Not a Myth

2

Why This Matters

2

The Problem With Agents

4

How does it work?

5

Why it works?

6

www.asigra.com
Agentless Backup is Not a Myth.
The Asigra solution requires no agents, which inherently makes it easier to install and
support than other backup and recovery solutions.
Backup and recovery software typically requires agents that are installed onto the servers that a system administrator wants to back up. Even in a modest-sized environment,
agent management can become extremely complex when an administrator is forced to
deal with different operating systems and revision levels. The complexity of agent management is further complicated by the growing number of applications that also require
agents running on the same servers. This proliferation of agents and its associated drain
on CPU resources is often referred to as “agent pollution”.
Asigra does not require any agents to be installed but instead reaches out over the
network to back up operating systems, file systems, and applications, using industrystandard programming interfaces. To understand how Asigra backs up data over a network without the use of agents, consider how a local hard drive on a typical PC can be
accessed remotely.
A system administrator only needs the right permissions to access that local hard
drive over the network. A disk-to-disk backup is performed by simply copying the contents of the hard drive to another hard drive on the network. Asigra software uses a
sophisticated extension of this idea, unlike other software that requires agents on every
machine. The Asigra solution is simple and elegant in concept, but required a lot of hard
work and years of development to get it right on a broad variety of operating systems
and data types.

Why This Matters
Dealing with backup software agents is a cumbersome
and mundane task that can be extremely time consuming.
Matching agent revisions with operating system levels,
researching compatibility issues, and other labor-intensive
tasks are non-existent when using the Asigra solution.
Additionally, many problems that occur while managing backup software in complex environments are due

to compatibility issues with agents. Compared to other
solutions, Asigra’s agentless design is inherently easier
to support and the risk of problems is reduced. Finally,
agents rob processing power from the core applications of
every machine on which they’re installed. Asigra makes no
such demands on the servers it is backing up. Multiplied
over thousands of machines, that extra power efficiency
can mean significant savings and greener operations.

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk
TRADITIONAL AGENT BASED
BACKUP SOFTWARE.
Take the inventory
Share it with the partner/vendor
(Disclose network information)
Ensure the configuration is
accurate and buy the agents
Buy additional agents
when you add servers,
applications, databases
 upgrade all agents
frequently

Agent
SharePoint

Agent
Exchange
Agent
Oracle

Agent
Sybase
Backup
Media Server

CE

NTR

AL

OF

Agent
GroupWise

FIC

E

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk

Agent
SQL
ASIGRA = AGENTLESS.
Multi-Site License (Capacity-based)
Add servers, applications, databases on the fly
Zero touch upgrades

SharePoint
Exchange
Oracle
SQL

Hyper-V
VMware
Laptop
DS-Client
DS-System

LOCAL
STORAGE

CE

NTR

AL

OF

IP
WAN

FIC

E

The Problem With Agents
The use of agents with a backup/recovery solution
(either a tape or a disk-to-disk (D2D) product), has a direct
impact on data security, recoverability, and costs. IT
managers know the downsides that accompany agentbased solutions:

Compromised security. A port in the firewall must be
opened for every agent. And, because almost every agent
has administrative privileges, it effectively creates vulnerability in the server architecture. Hackers need only to
tap into the agent to attack the server. With no “in-flight”
encryption, agents also put data at risk during transmission from the remote office to the data center.

More pieces of software to manage and to fail.
More sites, more data, more applications, more users, more
systems, more agents—growth makes everything harder

DISK
STORAGE

I NT
(PRE R N
A
M S IVAT L DA
E
T
(PUP DA CLO A CE
B L TA C U D NTE
)
IC
CL E NTE OR R
OU R
D)

to manage, and agents only compound the problem. As
infrastructure expands in size and complexity, problem
diagnosis takes longer. Every operating system upgrade
(now implemented monthly by many organizations) creates more opportunities for conflicts amongst applications,
including proliferating backup agents.
The fact is backup agents drain IT resources, cause disruptive downtime, and, ultimately, undermine the certainty of
data recoverability.

Exorbitant licensing fees. Traditional software vendors charge for software based on the old per-system
model. This is costly and requires customers to closely
monitor their complex system and user landscapes. For
many growing organizations, buying a site license is
actually a simpler solution — albeit even more costly and
often unnecessary — than trying to keep track of backup

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk
products installed across hundreds or thousands of
machines. There are even consulting companies that now
do audits to help enterprises lower license fees.

print servers, email servers, databases, and workstations.
For large enterprises with thousands of backup agents,
licensing and support costs can quickly add up to millions
of dollars.

Mounting administrative costs. Heterogeneous applica-

Application Disruption. Each time a hot fix or new

tion environments can be administrative nightmares when
backup processes require the installation and management
of a different agent for every kind of database, application
and operating system. It takes time and a lot of ‘touching’
of remote-site systems to push agents and upgrades out
to every server. And each time a data center administrator
or service provider has to deploy an agent, or intervene
to support it at a remote site, that cost rolls back into the
business model making it increasingly difficult to
remain competitive.

version of the software is released, the agents must be
upgraded too. This upgrade process requires a reboot of
the server that the agent resides on. Unfortunately, this
application disruption must be repeated for every affected
server on the network. With Asigra, there is no application
disruption. Asigra agentless client software is dispatched
and upgraded silently with no need for a server reboot.

How does it work?
As the industry’s only agentless, multi-site backup and
recovery software solution, Asigra technology completely
eliminates the negative impact of agents. How does
it work?

To put licensing and administrative costs in perspective,
an enterprise with as few as five offices can easily spend
$50,000 to purchase and maintain backup agents for file/

CLOUD
STORAGE

Direct Attached
(SATA)
ARCHIVE
STORAGE

BLM Archiver

Cloud Storage

Production
DS-License
Archive Data
Destruction
with Certificate
Web Portal

DS-Billing

NAS
DS-System

MS

CU

STO

ME

PP

RIM

LO
TU

S

IN

T

HY ANG
PE E
RV
M AREPO
IB

MS

SH

F

Windows
DS-Client

IL
SQ E SER
EX L D VER
CH B

LOCAL/
LOCAL-ONLY

AR
YD
ATA
C

EN

TER

IP
WAN

RA

(PU

BL

IC

LOCAL/
LOCAL-ONLY

CL
OU

D)

Linux
DS-Client

RE

MO
TE

US

IB CL
Xe M 0 E
nS B2
erv
er

UN
VM IX

IB wa
M re
OR AS40
A
0

DS-Mobile Client

ER

(S)

CU

STO

ME

RB

Initial Backup
to External
Digital Media

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk

ONLINE
STORAGE
The Asigra architecture consists of two software components: the DS-Client and the DS-System.
DS-Client software, installed on one server (Windows,
Macintosh, or Linux) at each local and remote site, captures data from its target backup machines. The DS-Client
then processes the data to reduce its size (compression
and deduplication), encrypts it for security, and then transmits the data via IP WAN to the DS-System at the
storage location.
The DS-Client does not require installation of any backup
agents on its target machines. The DS-Client fully integrates with NT domains, Trusts and Novell NDS trees, and
otherwise adopts the remote site’s existing LAN security
settings. Using standard APIs, the DS-Client can remotely
log in to target backup systems, capture requested
data, and securely manage transmissions to the central
site. Utilizing common data reduction technologies, the
DS-Client minimizes the amount of data transmitted and
stored at the onsite or off-site vault.
The DS-System manages the storage repository for backup
data transmitted from one or multiple DS-Clients. The
DS-System (configured as direct-attached disk, NAS or
SAN) can be installed on Linux and Windows platforms.
Asigra software integrates a comprehensive feature set
designed to maximize and accelerate data recoverability.
An Autonomic Healing module, for example, runs seamlessly in the background to identify and isolate corrupt or
otherwise problematic files. As an added value, if a corrupt
file is found to be irreparable, it is tagged to be re-transmitted on the next scheduled backup. Another feature, the
Local Restore tool, allows remote-office storage of backup
data. This ensures that local users can restore critical data
immediately and at LAN speed.
Additional Asigra tools include an Online File Summary,
Long Term Storage policy-making, a Discovery Tool to
automatically ascertain characteristics of primary data,
Email Message Level Restore, Bare Metal Restore capability, Client and System Monitoring, and SNMP Integration.

Why it works?
The Asigra software eliminates the requirement for locally
installed agents because it leverages the protocols, APIs,
methods and functionality that platform, operating system, database, and other application vendors utilize for
remotely managing their own systems. Other backup/
restore solutions require a unique backup agent (installed

on every target machine) for each type of system and
application. Asigra, however, supports all major platforms
and applications with a software system composed of just
two major components: the DS-Client (one installed at
each site) and the DS-System (installed at the
vaulting location).
Another advantage of the Asigra software is that it
enables multi-level access controls.

The Benefits of
Agentless:
Reduce Costs,
Robust Security,
Simpler Scaling.
At installation, the DS-Client is assigned privileges to
establish access rights that meet the requirements of the
site or organization. For example, the DS-Client might be
assigned multiple credentials for the same network to
allow the domain administrator to back up all systems,
including servers and workstations, while enabling users
to control the backups of individual workstations. The
Asigra software has also been highly optimized to conserve both LAN and target-system CPU resources.
Implementing an Asigra backup/recovery solution produces immediate and dramatic benefits.

Significant savings. Even if backup agents from other
vendors were free, the Asigra solution would still provide huge savings. First-year operating expenses alone
approach an estimated $150,000 for an enterprise environment with 1,000 server agents. Annual server maintenance
and operating expenses for this same configuration add up
to nearly $60,000. The agentless Asigra solution eliminates
those operating costs in addition to the purchase price of
the agents.

Simple licensing. DS-Client licenses ARE free. Asigra
offers businesses a unique pay-as-you-grow pricing model
based simply on the amount of compressed backup data

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk
stored. Customers purchase Asigra software the same as
disk capacity — no license fees, no tracking, no overspending on site licenses — paying only for compressed storage
capacity consumed.

One piece of software to install, manage, and
diagnose. Asigra software even upgrades itself, so there
are no time-consuming and resource-draining updates
required for the hundreds or perhaps thousands of systems
on typical enterprise networks.

WAN/LAN/CPU resource conservation. Asigra
software runs with negligible impact on servers, workstations, and laptops, eliminating the drain on CPU resources
associated with agent-based solutions. Data reduction
technologies also minimize the impact on bandwidth and
storage resources. While traditional agent-based backup/
recovery solutions require implementation of high-speed
connections between the central data center and remote
offices, Asigra works with existing links such as DSL.

Robust, hardcoded security. Asigra software provides
extremely safe ‘in-flight’ and ‘at-rest’ data security utilizing up to 256 bit AES encryption. And it works within the

organization’s security framework—there are no agents
to open hacker-tempting ports in the firewall. With secure
data transmission across an IP WAN, the Asigra solution
helps businesses achieve compliance, minimize information-loss liabilities, and protect customer confidence.

‘Elegant’ scaling. The DS-System is capable of elegantly
scaling both in the dimensions of capacity and performance. This type of scalability is critical for environments
with large numbers of remote sites, high-capacity data
sets, and rapid data growth. While agent-based solutions
compound complexity in rapid growth environments, the
Asigra agentless backup/recovery solution easily accommodates new capacity, new applications, and new sites.
Features such as integrated load balancing ensure efficiency across multiple DS-System IP addresses.

Backup consistency, improved recoverability. The
simplicity, efficiency, and security of the Asigra system
makes it easy for remote sites to implement and maintain
consistent data backup programs. This means companies
can significantly boost data recoverability in locations
where success rates below 50% were once the norm.

About Asigra
Asigra transforms the way businesses manage and protect their data by
delivering market leading cloud backup solutions that seamlessly and
efficiently manage, scale and deliver data protection services. Asigra
Cloud Backup™ is built for new and existing MSPs/VARs who focus
on data protection, IT constrained organizations, and industries with
compliance mandates that are looking to improve their backup with a
secure, reliable and predictable data protection cloud backup model.
With 25 years of experience as backup/recovery pioneers, Asigra

technology protects more than 400,000 sites globally ranging from the
Global 100 to SMBs. The world’s largest and most profitable service
providers including CDW, HP and Terremark Worldwide power their
cloud backup services using Asigra technology. Asigra is headquartered in Toronto, Canada, with offices globally.

Tel: 416.736.8111
Email: info@asigra.com
Web: www.asigra.com

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk

More Related Content

What's hot

Boomerang Total Recall
Boomerang Total RecallBoomerang Total Recall
Boomerang Total Recallbdoyle05
 
Orion NTA Customer Training
Orion NTA Customer TrainingOrion NTA Customer Training
Orion NTA Customer TrainingSolarWinds
 
Desktop management and support
Desktop management and supportDesktop management and support
Desktop management and supportStephen Rose
 
Managed Desktop Services
Managed Desktop ServicesManaged Desktop Services
Managed Desktop ServicesGss America
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechHelpSystems
 
Citrix command lines
Citrix command linesCitrix command lines
Citrix command linesprincesly
 
5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based SolutionsAsigra
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds
 
Managing a virtual datacenter with System Center
Managing a virtual datacenter with System CenterManaging a virtual datacenter with System Center
Managing a virtual datacenter with System CenterAmit Gatenyo
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparisonlneut03
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Troubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesTroubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesSolarWinds
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usgopi01
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 

What's hot (20)

Boomerang Total Recall
Boomerang Total RecallBoomerang Total Recall
Boomerang Total Recall
 
Orion NTA Customer Training
Orion NTA Customer TrainingOrion NTA Customer Training
Orion NTA Customer Training
 
Desktop management and support
Desktop management and supportDesktop management and support
Desktop management and support
 
Managed Desktop Services
Managed Desktop ServicesManaged Desktop Services
Managed Desktop Services
 
Liberatore_Resume
Liberatore_ResumeLiberatore_Resume
Liberatore_Resume
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
Citrix command lines
Citrix command linesCitrix command lines
Citrix command lines
 
5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
 
how-to-get-ready-ebook-en
how-to-get-ready-ebook-enhow-to-get-ready-ebook-en
how-to-get-ready-ebook-en
 
Managing a virtual datacenter with System Center
Managing a virtual datacenter with System CenterManaging a virtual datacenter with System Center
Managing a virtual datacenter with System Center
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Troubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesTroubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing Rules
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-us
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 

Similar to Icomm agentless-architecture

ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer Englishcynapspro GmbH
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the CloudSumo Logic
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer Englishcynapspro GmbH
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfAgaram Technologies
 
Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First ArchitectureCameron Vetter
 
Service Models - Databas - Monitoring - Communication.ppt
Service Models - Databas - Monitoring - Communication.pptService Models - Databas - Monitoring - Communication.ppt
Service Models - Databas - Monitoring - Communication.pptMohammadArmanulHaque
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTrihedral
 
Solution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesSolution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesCaitlin Brittingham
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesJeff Stokes
 
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfA Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfVenpep2
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet TemplateTDSmaker
 

Similar to Icomm agentless-architecture (20)

ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
EACS Cloud Backup
EACS Cloud BackupEACS Cloud Backup
EACS Cloud Backup
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
On premise vs cloud server
On premise vs cloud serverOn premise vs cloud server
On premise vs cloud server
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer English
 
Icomm cloud-backup-overview
Icomm cloud-backup-overviewIcomm cloud-backup-overview
Icomm cloud-backup-overview
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
ADC_ver-1.3
ADC_ver-1.3ADC_ver-1.3
ADC_ver-1.3
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First Architecture
 
Service Models - Databas - Monitoring - Communication.ppt
Service Models - Databas - Monitoring - Communication.pptService Models - Databas - Monitoring - Communication.ppt
Service Models - Databas - Monitoring - Communication.ppt
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Solution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesSolution Brief - Cloud Backup Services
Solution Brief - Cloud Backup Services
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfA Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 

More from Icomm Technologies

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks Icomm Technologies
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost StuctureIcomm Technologies
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Icomm Technologies
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in TelecommutingIcomm Technologies
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it Icomm Technologies
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deckIcomm Technologies
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm Technologies
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machinesIcomm Technologies
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Beakbane safeguards future with ERP - ready infrastructure upgrade.
Beakbane safeguards future with ERP - ready infrastructure upgrade.Beakbane safeguards future with ERP - ready infrastructure upgrade.
Beakbane safeguards future with ERP - ready infrastructure upgrade.Icomm Technologies
 

More from Icomm Technologies (20)

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Swivel Secure and Office 365
Swivel Secure and Office 365Swivel Secure and Office 365
Swivel Secure and Office 365
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in Telecommuting
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deck
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Beakbane safeguards future with ERP - ready infrastructure upgrade.
Beakbane safeguards future with ERP - ready infrastructure upgrade.Beakbane safeguards future with ERP - ready infrastructure upgrade.
Beakbane safeguards future with ERP - ready infrastructure upgrade.
 

Recently uploaded

Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Recently uploaded (20)

Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 

Icomm agentless-architecture

  • 1. Agentless Backup is Not a Myth. Contents Agentless Backup is Not a Myth 2 Why This Matters 2 The Problem With Agents 4 How does it work? 5 Why it works? 6 www.asigra.com
  • 2. Agentless Backup is Not a Myth. The Asigra solution requires no agents, which inherently makes it easier to install and support than other backup and recovery solutions. Backup and recovery software typically requires agents that are installed onto the servers that a system administrator wants to back up. Even in a modest-sized environment, agent management can become extremely complex when an administrator is forced to deal with different operating systems and revision levels. The complexity of agent management is further complicated by the growing number of applications that also require agents running on the same servers. This proliferation of agents and its associated drain on CPU resources is often referred to as “agent pollution”. Asigra does not require any agents to be installed but instead reaches out over the network to back up operating systems, file systems, and applications, using industrystandard programming interfaces. To understand how Asigra backs up data over a network without the use of agents, consider how a local hard drive on a typical PC can be accessed remotely. A system administrator only needs the right permissions to access that local hard drive over the network. A disk-to-disk backup is performed by simply copying the contents of the hard drive to another hard drive on the network. Asigra software uses a sophisticated extension of this idea, unlike other software that requires agents on every machine. The Asigra solution is simple and elegant in concept, but required a lot of hard work and years of development to get it right on a broad variety of operating systems and data types. Why This Matters Dealing with backup software agents is a cumbersome and mundane task that can be extremely time consuming. Matching agent revisions with operating system levels, researching compatibility issues, and other labor-intensive tasks are non-existent when using the Asigra solution. Additionally, many problems that occur while managing backup software in complex environments are due to compatibility issues with agents. Compared to other solutions, Asigra’s agentless design is inherently easier to support and the risk of problems is reduced. Finally, agents rob processing power from the core applications of every machine on which they’re installed. Asigra makes no such demands on the servers it is backing up. Multiplied over thousands of machines, that extra power efficiency can mean significant savings and greener operations. Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk
  • 3. TRADITIONAL AGENT BASED BACKUP SOFTWARE. Take the inventory Share it with the partner/vendor (Disclose network information) Ensure the configuration is accurate and buy the agents Buy additional agents when you add servers, applications, databases upgrade all agents frequently Agent SharePoint Agent Exchange Agent Oracle Agent Sybase Backup Media Server CE NTR AL OF Agent GroupWise FIC E Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk Agent SQL
  • 4. ASIGRA = AGENTLESS. Multi-Site License (Capacity-based) Add servers, applications, databases on the fly Zero touch upgrades SharePoint Exchange Oracle SQL Hyper-V VMware Laptop DS-Client DS-System LOCAL STORAGE CE NTR AL OF IP WAN FIC E The Problem With Agents The use of agents with a backup/recovery solution (either a tape or a disk-to-disk (D2D) product), has a direct impact on data security, recoverability, and costs. IT managers know the downsides that accompany agentbased solutions: Compromised security. A port in the firewall must be opened for every agent. And, because almost every agent has administrative privileges, it effectively creates vulnerability in the server architecture. Hackers need only to tap into the agent to attack the server. With no “in-flight” encryption, agents also put data at risk during transmission from the remote office to the data center. More pieces of software to manage and to fail. More sites, more data, more applications, more users, more systems, more agents—growth makes everything harder DISK STORAGE I NT (PRE R N A M S IVAT L DA E T (PUP DA CLO A CE B L TA C U D NTE ) IC CL E NTE OR R OU R D) to manage, and agents only compound the problem. As infrastructure expands in size and complexity, problem diagnosis takes longer. Every operating system upgrade (now implemented monthly by many organizations) creates more opportunities for conflicts amongst applications, including proliferating backup agents. The fact is backup agents drain IT resources, cause disruptive downtime, and, ultimately, undermine the certainty of data recoverability. Exorbitant licensing fees. Traditional software vendors charge for software based on the old per-system model. This is costly and requires customers to closely monitor their complex system and user landscapes. For many growing organizations, buying a site license is actually a simpler solution — albeit even more costly and often unnecessary — than trying to keep track of backup Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk
  • 5. products installed across hundreds or thousands of machines. There are even consulting companies that now do audits to help enterprises lower license fees. print servers, email servers, databases, and workstations. For large enterprises with thousands of backup agents, licensing and support costs can quickly add up to millions of dollars. Mounting administrative costs. Heterogeneous applica- Application Disruption. Each time a hot fix or new tion environments can be administrative nightmares when backup processes require the installation and management of a different agent for every kind of database, application and operating system. It takes time and a lot of ‘touching’ of remote-site systems to push agents and upgrades out to every server. And each time a data center administrator or service provider has to deploy an agent, or intervene to support it at a remote site, that cost rolls back into the business model making it increasingly difficult to remain competitive. version of the software is released, the agents must be upgraded too. This upgrade process requires a reboot of the server that the agent resides on. Unfortunately, this application disruption must be repeated for every affected server on the network. With Asigra, there is no application disruption. Asigra agentless client software is dispatched and upgraded silently with no need for a server reboot. How does it work? As the industry’s only agentless, multi-site backup and recovery software solution, Asigra technology completely eliminates the negative impact of agents. How does it work? To put licensing and administrative costs in perspective, an enterprise with as few as five offices can easily spend $50,000 to purchase and maintain backup agents for file/ CLOUD STORAGE Direct Attached (SATA) ARCHIVE STORAGE BLM Archiver Cloud Storage Production DS-License Archive Data Destruction with Certificate Web Portal DS-Billing NAS DS-System MS CU STO ME PP RIM LO TU S IN T HY ANG PE E RV M AREPO IB MS SH F Windows DS-Client IL SQ E SER EX L D VER CH B LOCAL/ LOCAL-ONLY AR YD ATA C EN TER IP WAN RA (PU BL IC LOCAL/ LOCAL-ONLY CL OU D) Linux DS-Client RE MO TE US IB CL Xe M 0 E nS B2 erv er UN VM IX IB wa M re OR AS40 A 0 DS-Mobile Client ER (S) CU STO ME RB Initial Backup to External Digital Media Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk ONLINE STORAGE
  • 6. The Asigra architecture consists of two software components: the DS-Client and the DS-System. DS-Client software, installed on one server (Windows, Macintosh, or Linux) at each local and remote site, captures data from its target backup machines. The DS-Client then processes the data to reduce its size (compression and deduplication), encrypts it for security, and then transmits the data via IP WAN to the DS-System at the storage location. The DS-Client does not require installation of any backup agents on its target machines. The DS-Client fully integrates with NT domains, Trusts and Novell NDS trees, and otherwise adopts the remote site’s existing LAN security settings. Using standard APIs, the DS-Client can remotely log in to target backup systems, capture requested data, and securely manage transmissions to the central site. Utilizing common data reduction technologies, the DS-Client minimizes the amount of data transmitted and stored at the onsite or off-site vault. The DS-System manages the storage repository for backup data transmitted from one or multiple DS-Clients. The DS-System (configured as direct-attached disk, NAS or SAN) can be installed on Linux and Windows platforms. Asigra software integrates a comprehensive feature set designed to maximize and accelerate data recoverability. An Autonomic Healing module, for example, runs seamlessly in the background to identify and isolate corrupt or otherwise problematic files. As an added value, if a corrupt file is found to be irreparable, it is tagged to be re-transmitted on the next scheduled backup. Another feature, the Local Restore tool, allows remote-office storage of backup data. This ensures that local users can restore critical data immediately and at LAN speed. Additional Asigra tools include an Online File Summary, Long Term Storage policy-making, a Discovery Tool to automatically ascertain characteristics of primary data, Email Message Level Restore, Bare Metal Restore capability, Client and System Monitoring, and SNMP Integration. Why it works? The Asigra software eliminates the requirement for locally installed agents because it leverages the protocols, APIs, methods and functionality that platform, operating system, database, and other application vendors utilize for remotely managing their own systems. Other backup/ restore solutions require a unique backup agent (installed on every target machine) for each type of system and application. Asigra, however, supports all major platforms and applications with a software system composed of just two major components: the DS-Client (one installed at each site) and the DS-System (installed at the vaulting location). Another advantage of the Asigra software is that it enables multi-level access controls. The Benefits of Agentless: Reduce Costs, Robust Security, Simpler Scaling. At installation, the DS-Client is assigned privileges to establish access rights that meet the requirements of the site or organization. For example, the DS-Client might be assigned multiple credentials for the same network to allow the domain administrator to back up all systems, including servers and workstations, while enabling users to control the backups of individual workstations. The Asigra software has also been highly optimized to conserve both LAN and target-system CPU resources. Implementing an Asigra backup/recovery solution produces immediate and dramatic benefits. Significant savings. Even if backup agents from other vendors were free, the Asigra solution would still provide huge savings. First-year operating expenses alone approach an estimated $150,000 for an enterprise environment with 1,000 server agents. Annual server maintenance and operating expenses for this same configuration add up to nearly $60,000. The agentless Asigra solution eliminates those operating costs in addition to the purchase price of the agents. Simple licensing. DS-Client licenses ARE free. Asigra offers businesses a unique pay-as-you-grow pricing model based simply on the amount of compressed backup data Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk
  • 7. stored. Customers purchase Asigra software the same as disk capacity — no license fees, no tracking, no overspending on site licenses — paying only for compressed storage capacity consumed. One piece of software to install, manage, and diagnose. Asigra software even upgrades itself, so there are no time-consuming and resource-draining updates required for the hundreds or perhaps thousands of systems on typical enterprise networks. WAN/LAN/CPU resource conservation. Asigra software runs with negligible impact on servers, workstations, and laptops, eliminating the drain on CPU resources associated with agent-based solutions. Data reduction technologies also minimize the impact on bandwidth and storage resources. While traditional agent-based backup/ recovery solutions require implementation of high-speed connections between the central data center and remote offices, Asigra works with existing links such as DSL. Robust, hardcoded security. Asigra software provides extremely safe ‘in-flight’ and ‘at-rest’ data security utilizing up to 256 bit AES encryption. And it works within the organization’s security framework—there are no agents to open hacker-tempting ports in the firewall. With secure data transmission across an IP WAN, the Asigra solution helps businesses achieve compliance, minimize information-loss liabilities, and protect customer confidence. ‘Elegant’ scaling. The DS-System is capable of elegantly scaling both in the dimensions of capacity and performance. This type of scalability is critical for environments with large numbers of remote sites, high-capacity data sets, and rapid data growth. While agent-based solutions compound complexity in rapid growth environments, the Asigra agentless backup/recovery solution easily accommodates new capacity, new applications, and new sites. Features such as integrated load balancing ensure efficiency across multiple DS-System IP addresses. Backup consistency, improved recoverability. The simplicity, efficiency, and security of the Asigra system makes it easy for remote sites to implement and maintain consistent data backup programs. This means companies can significantly boost data recoverability in locations where success rates below 50% were once the norm. About Asigra Asigra transforms the way businesses manage and protect their data by delivering market leading cloud backup solutions that seamlessly and efficiently manage, scale and deliver data protection services. Asigra Cloud Backup™ is built for new and existing MSPs/VARs who focus on data protection, IT constrained organizations, and industries with compliance mandates that are looking to improve their backup with a secure, reliable and predictable data protection cloud backup model. With 25 years of experience as backup/recovery pioneers, Asigra technology protects more than 400,000 sites globally ranging from the Global 100 to SMBs. The world’s largest and most profitable service providers including CDW, HP and Terremark Worldwide power their cloud backup services using Asigra technology. Asigra is headquartered in Toronto, Canada, with offices globally. Tel: 416.736.8111 Email: info@asigra.com Web: www.asigra.com Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk