CINXE.COM
<!DOCTYPE html><html class="n2appshell n2-appshell-styles chrome"><head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://features.zdnet.com/veritas/forward-thinking-backup/","20211019154936","https://web.archive.org/","web","/_static/", "1634658576"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <script type="text/javascript" src="https://web.archive.org/web/20211019154936js_/http://cbsi.demdex.net/event?d_mid=61802052294512815669186610150765026208&d_nsid=0&d_ld=_ts%3D1541691194741&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1541691194741&c_hash=&c_host=features.zdnet.com&c_hostname=features.zdnet.com&c_pathname=veritas%2Fforward-thinking-backup&c_protocol=http%3A"></script><script async src="https://web.archive.org/web/20211019154936js_/http://b.scorecardresearch.com/beacon.js"></script><script async src="https://web.archive.org/web/20211019154936js_/http://b.scorecardresearch.com/beacon.js"></script><script type="text/javascript" async="async" src="https://web.archive.org/web/20211019154936js_/http://dpm.demdex.net/id?d_visid_ver=1.5.2&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_cb=s_c_il%5B1%5D._setMarketingCloudFields"></script> <script type="text/javascript">document.write('<base href="/veritas/">');</script><base href="/web/20211019154936/https://features.zdnet.com/veritas/"> <meta http-equiv="cache-control" content="no-cache"> <meta http-equiv="expires" content="0"> <script> var hostname = document.location.hostname; var ipRegex = /[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/g; var protocol = document.location.protocol; var baseElement = document.querySelector('base'); if (protocol === 'file:') { // Replace base for offline use (no html5push state) window.html5Mode = false; // disable html5 mode in Adobe app baseElement.remove(); } else if (hostname.indexOf(atob('YWRvYmUuY29t')) !== -1) { // Remove base tag in Adobe Publish web viewer and local Apps baseElement.remove(); } else if (((window.location.href.indexOf(atob('L2F1dG9zL2Fib3V0')) !== -1) || (window.location.href.indexOf(atob('L3JvYWRzaG93L2Fib3V0')) !== -1)) && (navigator.userAgent.indexOf('Prerender') === -1)) { baseElement.remove(); document.write(atob('PGJhc2UgaHJlZj0iLy93d3cuY25ldC5jb20vcm9hZHNob3cvIi8+')); } else if (hostname === 'localhost' || ipRegex.test(hostname) || hostname.indexOf('.local') === (hostname.length - 6)) { window.localhost = true; document.write('<base href="/"/>'); } else { // Base url will be relative: app-name/ // Custom domain: http://custom-domain.com/some-folder-for-seo/app-name => base url needs to change to this // Internal publish link: http://demo.stage.storied.co/app-name => base url can change to this url var baseUrl = baseElement.getAttribute('href'); // Only change the base url for previewed apps or apps that have a sub folder custom domain. eg: // http://stage.storied.co/projects/a8bd1d22b98ad422b308dfa0d3ca7446/ // http://custom-domain.com/some-folder-for-seo/app-name // Regular custom domains should not be rewritten. eg: // http://custom-domain.com/app-name if (baseUrl !== "/") { baseElement.href = window.location.pathname.substring(0, window.location.pathname.indexOf(baseUrl) + baseUrl.length); // http://cnet.com/app-name/ } } // This string gets replaced by Grunt if there is an override in cfg.json. var baseOverride = '%base_override%'; // Only the first instance will get replaced // config.json override has priority over every other base href, except prerender. if (baseOverride !== ('%base_override%') && navigator.userAgent.indexOf('Prerender') === -1) { var baseTagElement = document.querySelector('base'); var headElement = document.querySelector('head'); if (baseTagElement) { headElement.removeChild(baseTagElement); } var newBaseElement = document.createElement('base'); newBaseElement.href = baseOverride; headElement.appendChild(newBaseElement); } window.prerenderReady = false; </script> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <title ng-bind="seo.title" class="ng-binding">Forward Thinking Backup - Veritas</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <meta name="generator" content="storied.co"> <meta name="application-name" ng-attr-content="{{seo.siteName}}" content="Veritas"> <meta name="keywords" ng-attr-content="{{seo.keywords}}" ng-if="seo.keywords" class="ng-scope" content="[]"> <meta name="news_keywords" ng-attr-content="{{seo.keywords}}" ng-if="seo.keywords" class="ng-scope" content="[]"> <meta name="publish-date" ng-attr-content="{{seo.publishDate}}" content="2018-04-25T12:12:54+00:00"> <meta property="article:published_time" ng-attr-content="{{seo.publishDate}}" content="2018-04-25T12:12:54+00:00"> <meta property="article:modified_time" ng-attr-content="{{seo.modifyDate}}" content="2018-04-25T12:12:54+00:00"> <meta name="generator" content="storied.co"> <meta name="apple-mobile-web-app-title" ng-attr-content="{{::seo.title}}" content="Forward Thinking Backup - Veritas"> <meta property="og:site_name" ng-attr-content="{{share.siteName}}" content="Veritas"> <meta property="og:title" ng-attr-content="{{share.title}}" content="Forward Thinking Backup - Veritas"> <meta property="og:description" ng-attr-content="{{share.description}}" content="---"> <meta property="og:url" ng-attr-content="{{seo.url}}" content="https://web.archive.org/web/20211019154936/http://features.zdnet.com/veritas/forward-thinking-backup"> <meta property="og:image" ng-attr-content="{{share.image}}" ng-if="share.image" class="ng-scope" content="https://web.archive.org/web/20211019154936im_/https://static.storied.co/n2ps/legacy/uploads/prv_82d75ea830ad674138ccdfaf5685411b.jpg"> <meta property="og:image:type" content="image/jpeg" ng-if="share.image" class="ng-scope"> <meta property="og:image:width" content="630" ng-if="share.image" class="ng-scope"> <meta property="og:image:height" content="315" ng-if="share.image" class="ng-scope"> <meta property="og:description" ng-attr-content="{{share.description}}" ng-if="share.description" class="ng-scope" content="---"> <meta property="fb:app_id" ng-attr-content="{{share.facebookId}}" ng-if="share.facebookId" class="ng-scope" content="966242223397117"> <meta property="og:type" content="article"> <meta name="twitter:card" content="summary_large_image"> <meta name="twitter:creator" ng-attr-content="{{seo.author}}" content="ZDnet Main"> <meta name="twitter:site" ng-attr-content="{{share.twitterSiteName}}" content="Veritas"> <meta name="apple-mobile-web-app-capable" content="yes"> <meta name="apple-mobile-web-app-status-bar-style" content="black"> <meta name="format-detection" content="address=no;email=no"> <meta name="mobile-web-app-capable" content="yes"> <link rel="apple-touch-icon" sizes="180x180" href="https://web.archive.org/web/20211019154936im_/https://n2.storied.co/assets/img/favicon-32x32.png"> <link rel="icon" type="image/png" sizes="32x32" href="https://web.archive.org/web/20211019154936im_/https://n2.storied.co/assets/img/favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="https://web.archive.org/web/20211019154936im_/https://n2.storied.co/assets/img/favicon-32x32.png"> <link rel="dns-prefetch" href="https://web.archive.org/web/20211019154936/https://0gv2ds5jh3.execute-api.us-east-1.amazonaws.com/"> <link rel="dns-prefetch" href="https://web.archive.org/web/20211019154936/https://cdnjs.cloudflare.com/"> <link rel="dns-prefetch" href="https://web.archive.org/web/20211019154936/https://feeds.storied.co/"> <link rel="dns-prefetch" href="https://web.archive.org/web/20211019154936/https://n2.storied.co/"> <link rel="dns-prefetch" href="https://web.archive.org/web/20211019154936/https://n2ps.storied.co/"> <link rel="dns-prefetch" href="https://web.archive.org/web/20211019154936/https://s3.amazonaws.com/"> <link rel="dns-prefetch" href="https://web.archive.org/web/20211019154936/https://s3.us-east-1.amazonaws.com/"> <link rel="dns-prefetch" href="https://web.archive.org/web/20211019154936/https://static.storied.co/"> <meta name="viewport" content="user-scalable=no, initial-scale=1.0, maximum-scale=1.0, width=device-width"> <link rel="stylesheet" href="https://web.archive.org/web/20211019154936cs_/https://n2.storied.co/f1f16309d85921120db108cd04c490dcb54c673d/css/n2.min.css"> <link rel="stylesheet" href="/web/20211019154936cs_/https://features.zdnet.com/veritas/content/styles/custom.css"> <script type="text/javascript"> window.n2 = window.n2 || {}; window.n2.analytics = window.n2.analytics || {}; window.n2.analytics.startTime = new Date().getTime(); </script> <script type="text/javascript" src="https://web.archive.org/web/20211019154936js_/https://static.storied.co/n2ps/legacy/uploads/54e948f9d4bf28ad05d1678709501494.js"></script> <script charset="utf-8" src="https://web.archive.org/web/20211019154936js_/https://n2.storied.co/f1f16309d85921120db108cd04c490dcb54c673d/js/n2-chunk-e642b3495b857ead37eb.js"></script><link rel="stylesheet" href="/web/20211019154936cs_/https://features.zdnet.com/veritas/styles.css"></head> <body class="large n2-page-forward-thinking-backup prerender desktop"><article class="n2-studio-grid n2-background n2-editable-background n2-studio-page widget-outlines ng-scope" id="wrpr_573b2864cb1aa" style="padding: 0px;"><div class="bg-stack bg-stack-main"><div class="n2-waypoint-shade" style="opacity: 0; background-position: 93% 20%; background-size: cover; background-image: url("https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/8f397087dc9b8be4cf3f93662810fa13.jpg");" id="waypoint_1464863741231fc729f8b-layer"></div><div class="n2-waypoint-shade" style="opacity: 0; background-position: 90% 19%; background-size: cover; background-image: url("https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/589d6a6defd6712ebae7b688360c6dbe.jpg");" id="waypoint_573b2864d9b76-layer"></div></div> <div class="widget-outlines" id="n2section_573b2864cd518" parallax="" ratio="0.2" reverse="true"> <div class="row n2-studio-grid-row foundation-large-default foundation-medium-default foundation-small-default n2-inlinegrid widget-outlines foundation-desktop-preset foundation-large-preset foundation-medium-preset foundation-small-preset" id="n2InlineGrid_573b2864cd616"> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-12 foundation-large-12 foundation-medium-12 foundation-small-12" id="column_573b2864cd731"></div> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-12 foundation-large-12 foundation-medium-12 foundation-small-12" id="column_573b2864cd86f"></div> </div> </div> <section class="n2-studio-editable" id="n2section_1465312475115b17732b2" style=""> <div class="spacer n2-spacer" id="n2spacer_1465313758815d0061bd8" style=""></div> <p><a href="https://web.archive.org/web/20211019154936/https://www.veritas.com/" target="_blank" title="https://www.veritas.com/">Forward thinking backup: why data protection matters</a></p> <div class="spacer n2-spacer" id="n2spacer_14653137370716308a020"></div> </section> <section class="n2-studio-editable widget-outlines" id="n2section_573b2864cd95a" n2-above-the-fold=""> <div class="row n2-studio-grid-row foundation-large-default foundation-medium-default foundation-small-default n2-inlinegrid widget-outlines foundation-desktop-preset foundation-large-preset foundation-medium-preset foundation-small-preset" id="n2InlineGrid_573b2864cda5a" name="Inline Grid"> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-12 foundation-large-12 foundation-medium-12 foundation-small-12" id="column_573b2864cdb94"> <p class="n2-text-block" id="text_14647744095686c4e8343">Transformative disruption to new converged & hyperconverged information-centric operations demands an equally converged approach to data protection</p> <p class="n2-text-block widget-outlines" data-height="557" id="wrpr_573b2864ccba5373">The core truth we come back to time and time again when it comes to our use of data, software applications and information services is that we care about our data and its value to us, that’s why we create it in the first instance.</p><p>Because of this core truism, firms in every vertical ultimately start to experience anxiety over the need to protect their data.</p><p>Enterprise organisations today see their IT operations departments, line of business managers and individual users all becoming increasingly aware of the threats that can negatively impact and affect data integrity.</p><p>Data integrity risk factors</p><p>From management software crashes, malware attacks, hard disk failures, physical theft and force majeure acts of god, we realise that our data has a fragility that needs protecting.</p><p>Data has a life and it very often has a lifespan, because of this we need to look after it. Adopting a formalised and proactive approach to backup means building data protection intelligence into every firm’s IT stack as a matter of base-level architectural engineering.</p><p>Firms in every vertical are undergoing positively disruptive changes that drive transformation to a new level of digital business. The challenge these same firms have is that when they modernise manufacturing, production processes and/or service delivery, they must also modernise their approach to information protection.</p><p>The bottom line is… new converged IT infrastructure and hyperconverged systems demand an equally converged approach to data protection.</p><p></p> </div> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-12 foundation-large-12 foundation-medium-12 foundation-small-12" id="column_573b2864d70ae"></div> </div> <div class="row n2-studio-grid-row foundation-large-default foundation-medium-default foundation-small-default n2-inlinegrid widget-outlines foundation-desktop-preset foundation-large-preset foundation-medium-preset foundation-small-preset" id="inlinegrid_1464794399998e0e0a9e6" name="Section 11"> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-12 foundation-large-12 foundation-medium-12 foundation-small-12" id="column_1464794399998d35cd6bb"><img id="simpleimage_1464794399998f0fd595a" style="" src="https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/4b71924edf8b2257dc46281211bc9baf.jpg"> <p class="n2-text-block widget-outlines" data-height="469" id="text_146479439999981671022" style="">Converged IT demands converged data protection</p><p>But data protection is complex. Firms operating datacentre operations large or small are faced with the challenge of seeing clearly though a wide and potentially blinding spectrum of backup infrastructures.</p><p>Approaches to backup include traditional solutions such as ‘build-your-own’ tactics or the use of pre-installed software. The problem with these methods is that although they tend to save money upfront at the time of initial purchase, over the long term they require more time and budget due to ongoing maintenance.<br></p> </div> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-12 foundation-large-12 foundation-medium-12 foundation-small-12" id="column_1464794400003be0d2887"></div> </div> </section> <section class="n2-studio-editable widget-outlines" id="section_146486374123076b3214f" parallax="" ratio="0.2" reverse="true" style="background-image: none; overflow: hidden;"><div class="spacer n2-spacer n2-spacer-parallax ng-scope" id="section_146486374123076b3214f" style="max-height: none; min-height: 0px; position: absolute; opacity: 1; height: 888px; top: -124px; transform: translate3d(0px, -487.6px, 0px); backface-visibility: hidden;"></div><waypoint action="changeBackgroundImage" backgroundsize="Cover" blur="0" class="wa_off ng-isolate-scope" id="waypoint_1464863741231fc729f8b" offset="110%" parameters="{'image':'https://n2ps.storied.co/uploads/8f397087dc9b8be4cf3f93662810fa13.jpg','focalX':93,'focalY':20}" waypoint="" image="https://n2ps.storied.co/uploads/8f397087dc9b8be4cf3f93662810fa13.jpg" focalx="93" focaly="20"></waypoint> <div class="spacer n2-spacer widget-outlines" data-height="321.1875" id="spacer_14648637412318493aeca" style=""></div> <p class="n2-text-block" data-height="330" id="text_14648654113329f2a9be4" style="">Data protection is complex. Firms operating datacentre operations large or small are faced with the challenge of seeing clearly though a wide and potentially blinding spectrum of backup infrastructures. <br></p> <div class="spacer n2-spacer widget-outlines" data-height="321.1875" id="spacer_146486551329097c39900" style=""></div> </section> <section class="n2-studio-editable widget-outlines" id="n2section_573b2864d8003"> <p class="n2-text-block widget-outlines" data-height="96" id="text_573b2864d8112">The unified & converged road ahead</p> <p class="n2-text-block widget-outlines" data-height="838" id="text_573b2864d8203">On the unified technology road ahead, we see that hardware and software are specifically engineered to complement each other. This is a place where backup exists as a native elemental component and practice inside the converged computing platform and appliances that we place our trust in. This is an environment where complexity is driven out by the use of purpose-built backup appliances (PBBAs), which become critical to companies’ business continuity and recovery practices.</p><p>A clear business advantage</p><p>From deeply technical roots here, a clear business message arises i.e. core data protection in a converged infrastructure world leads us to a state where server virtualisation has a transformative effect on IT operations.</p><p>Functional aspects of data protection such as storage management and information governance do not happen on their own just because a firm has a departmental- or divisional-level server, or even a cloud datacentre operation.</p><p>A converged IT operations team leverages integrated software, servers and storage to reap the rewards that come from knowing when to backup through a management intelligence layer. The business that this IT operations team serves also benefits from orchestrated backup, forward-thinking backup, capacity planning and overall converged backup.</p><p>As content grows (which it inevitably does towards petabytes of data) and data responsibilities grow… the need to engineer towards proactive protection of this kind modernisation becomes key.</p><p></p> <p class="n2-text-block widget-outlines" data-height="148" id="text_573b2864d8712" style="">As content grows and data responsibilities grow… the need to engineer towards proactive protection of this kind modernisation becomes key.<br></p> <p class="n2-text-block widget-outlines" id="text_573b2864d8818">Where data operations were once fragmented, complex and contorted inside disconnected point solutions, they now become fast to deploy, easy to manage and above all integrated.</p><p>The future-focused forward-thinking backup driven organisation is able to protect all of its physical machines, virtual machines, databases, applications, cloud workloads and storage repositories in one single integrated solution.<br></p> <img id="simpleimage_14648614163260d742942" src="https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/77649aa82f599d61e0b46d70e2183856.jpg"> <p class="n2-text-block widget-outlines" id="text_14648614260116ca4d38f"><br>Scalability factors</p><p>A key part of our rationale for moving to new converged IT operations is scalability. The ability to scale both upwards and downwards to adapt to changing market conditions is key to harnessing the inherent flexibility that comes from cloud computing and our contemporary approach to software-defined IT infrastructures.</p><p>Scaling data protection for large-scale heterogeneous computing environments that can work with the future virtual and software-defined environments of tomorrow is complex, so how do we do it?</p><p>Key facilitating technologies here should gravitate towards purpose-built backup appliances (PBBAs) for business continuity. PBBAs operate with a naturally faster operation time to execute backups in a smaller number of hours – but why does this produce better business continuity?</p><p>The reason is that any time a backup solution runs for a long time, especially outside a typical six to eight-hour backup window, production applications are more likely to suffer poor performance.</p><p>When the business enjoys increased performance due to custom-engineered backups that do not negatively impact upon business performance, a higher level of business continuity is attained. <br></p> </section> <section class="n2-studio-editable widget-outlines" id="section_573b2864d9a37" parallax="" ratio="0.2" reverse="true" style="background-image: none; overflow: hidden;"><div class="spacer n2-spacer n2-spacer-parallax ng-scope" id="section_573b2864d9a37" style="max-height: none; min-height: 0px; position: absolute; opacity: 1; height: 1272px; top: -156px; transform: translate3d(0px, -1171.8px, 0px); backface-visibility: hidden;"></div><waypoint action="changeBackgroundImage" backgroundsize="Cover" blur="0" class="wa_off ng-isolate-scope" id="waypoint_573b2864d9b76" offset="110%" parameters="{'image':'https://n2ps.storied.co/uploads/589d6a6defd6712ebae7b688360c6dbe.jpg','focalX':90,'focalY':19}" waypoint="" image="https://n2ps.storied.co/uploads/589d6a6defd6712ebae7b688360c6dbe.jpg" focalx="90" focaly="19"></waypoint> <p class="n2-text-block" data-height="110" id="text_146487016024430d744c6" style="">A logical business-technology algorithm<br></p> <p class="n2-text-block" data-height="568" id="text_146487017793027a9c031">A direct consequence of improved business continuity is improved scalability. A direct consequence of improved scalable business continuity inside converged unified IT infrastructure platforms is improved business agility… and this leads finally onwards to improved profitability potential, every time.</p><p>Essentially then, we see this new level of business continuity and agility stemming from the arrival of the hyperconverged appliance and the converged-systems architecture.</p><p>“Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualisation,” argues Principal Analyst at ESG Jason Buffington.</p><p>“The industry has evolved from simply installing hypervisors on traditional servers, through deploying blades and chassis, and most recently, to leveraging what many consider the epitomes of the IT infrastructure building block: the hyperconverged appliance and the converged-systems rack architecture,” he added.</p><p>When combined and deployed intelligently, ability to ‘scale gracefully’ to thousands of petabytes of data across hundreds and thousands of devices gives businesses the chance to scale like never before.<br></p> </section> <section class="n2-studio-editable widget-outlines" id="n2section_573b2864da273"> <p class="n2-text-block widget-outlines" id="text_573b2864da394">Data protection modernisation as part of a wider progression<br></p> <p class="n2-text-block widget-outlines" id="text_573b2864da496">Advanced hardware and software deployment requires advanced backup protection and advanced hardware integration prowess if predictable performance levels are to be achieved. But these advancements need to be delivered as part of a wider strategic IT infrastructure progression.</p><p>As ESG’s Buffington has said, proactive protection modernisation means that selecting and modernising a firm’s data protection tools is done within the scope of the modernisation process also supporting a broader IT strategy. Further, this modernisation should be enacted as part of modernising the total production infrastructure. <br></p> <img id="simpleimage_146477780179205f92aee" src="https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/c59522de7c9ce6bfe3f28eafb7b004d7.jpg"> <p class="n2-text-block widget-outlines" id="text_146477790842854e034d9">“Being proactive enables vAdmins, backup specialists and IT architects to communicate and collaborate on what SLAs are required and what kinds of recovery agility are needed by the business units. Once those specifications are identified, a plan is developed and executed, which includes deploying data protection solution(s) as part of the virtualisation infrastructure deployment,” said Buffington.</p><p>The ESG analysts warns against reactive protection modernisation, where an organisation attempts to use its mediocre outdated backup solution for a highly virtualised environment, causing significant I/O impact among the VMs and dissatisfaction among the vAdmins, IT architects and end-users.</p><p>“IT is then forced to deal with that issue via a hastily upgraded backup implementation, which can affect other data protection scenarios until the entire environment is upgraded to a new solution,” said Buffington<br></p> </section> <section class="n2-studio-editable" id="n2section_14647779822828c0e5379"> <n2-video ard="" aspectratio="1.7777778" autoplay="autoplay" class="n2-video ng-isolate-scope ng-scope" controls="true" duration="" focalx="50" focaly="50" fps="" id="n2video_1464778049176e5a581e2" portrait-source-height="720" portrait-source-width="404" poster="https://n2ps.storied.co/uploads/prv3_606ae517a09f0becb5de01fa7827dff5.jpg" source-height="1080" source-width="1920" src="//n2ps.storied.co/uploads/606ae517a09f0becb5de01fa7827dff5" videoheight="100%" videowidth="100%" name="VER15001_NetBackup_Video_R14 (1).mov" length="02:03"><img class="poster" ng-src="https://n2ps.storied.co/uploads/prv3_606ae517a09f0becb5de01fa7827dff5.jpg" src="https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/prv3_606ae517a09f0becb5de01fa7827dff5.jpg"> <video ng-attr-width="{{videowidth}}" ng-attr-height="{{videoheight}}" style="width: 100%; height: 100%" ng-attr-preload="{{preload}}" ng-attr-poster="{{poster}}" playsinline="" webkit-playsinline="" preload="none" poster="https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/prv3_606ae517a09f0becb5de01fa7827dff5.jpg"> <source type="video/mp4"> </video> <div class="click-cover" style="touch-action: manipulation; -webkit-user-drag: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0);"> <div class="n2-icon play-icon" ng-style="playIconCss && {'background-image': playIconCss}" style="display: none;"></div> <div class="video-controls audio-controls"> </div> <div class="video-controls remaining-time"> </div> <div class="video-controls full-controls stop-propagation-content-stack stop-propagation-content-stack-horizontal"> <div class="button play-button" style="touch-action: manipulation; -webkit-user-drag: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0);"> <div></div> </div> <div class="current-time"> 00:00 </div> <div class="progress-bar"> <div class="rail"></div> <div class="handle" style="touch-action: pan-y; -webkit-user-drag: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0);"> <div></div> </div> </div> <div class="duration"> --:-- </div> <div class="button audio-button" style="touch-action: manipulation; -webkit-user-drag: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0);"> <div></div> </div> <div class="button fullscreen-button" style="touch-action: manipulation; -webkit-user-drag: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0);"> <div></div> </div> </div> </div> </n2-video> </section> <section class="n2-studio-editable widget-outlines" id="section_573b2864dbd74" parallax="" ratio="0.2" reverse="true" style="background-image: none; overflow: hidden;"><div class="spacer n2-spacer n2-spacer-parallax ng-scope" id="section_573b2864dbd74" style="max-height: none; min-height: 0px; position: absolute; opacity: 1; height: 120px; top: -60px; transform: translate3d(0px, -1569.4px, 0px); backface-visibility: hidden;"></div> <div class="row n2-studio-grid-row foundation-large-default foundation-medium-default foundation-small-default n2-inlinegrid widget-outlines foundation-desktop-preset foundation-large-preset foundation-medium-preset foundation-small-preset" id="inlinegrid_573b2864dbdff"> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-12 foundation-large-12 foundation-medium-12 foundation-small-12" id="column_573b2864dbef7"></div> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-12 foundation-large-12 foundation-medium-12 foundation-small-12" id="column_573b2864dbfe1"></div> </div> </section> <section class="n2-studio-editable widget-outlines" id="n2section_573b2864dc6d0"> <p class="n2-text-block widget-outlines" id="text_14647780902095ba0f55b">THE BIGGER BIG DATA TRUTH<br></p> <p class="n2-text-block widget-outlines" id="text_573b2864dc7ee">Improving data protection continues to be one of the most commonly cited IT spending priorities among IT decision makers, year after year—it is a priority often spurred by the deployment of new IT workloads that demand modern protection and recovery approaches.</p><p>We know now that one of the key drivers for a ‘new’ level of data protection is server virtualisation – and virtualisation (storage, compute, and networking) is often best achieved through converged or hyperconverged platforms because of their pre-integration, ease and consistency of deployment, and their ability to increase the VM density, resulting in more efficiency and agility.</p><p>Virtualisation’s transformative impact on IT cannot be overstated, this is surely another core truism that underpins this discussion.</p><p>No plug-and-play panacea</p><p>But virtualised converged IT operations with proactive next-generation data protection and backup intelligence is not a plug-and-play panacea. It doesn’t ‘just work’ on its own.</p><p>The combination of technologies presented here are extremely powerful. Badly planned and/or poorly implemented they can create unreliability, instability and uncertainty i.e. precisely the opposite of what they are designed to eradicate.</p><p>Strategic proactive planning is required to bring newly modernised mechanisms for data protection online as part of a wider strategy for both a modernised technology stack across the business and, in parallel, a modernised production infrastructure for any firm’s goods and services.<br></p> </section> <section class="n2-studio-editable" id="n2section_1465373927798ceb693cb"> <p class="n2-text-block widget-outlines" id="text_1465374132009db07a505">DISCOVER MORE<br></p> <p class="n2-text-block widget-outlines" id="text_146537413727151f35fac">This content has been produced in collaboration with Veritas. To discover more on how Veritas can make data work for you then explore the full white papers below:<br></p> <div class="row n2-studio-grid-row foundation-large-default foundation-medium-default foundation-small-default n2-inlinegrid" id="n2InlineGrid_14653741763076ede1662"> <div class="columns n2-studio-grid-col foundation-desktop-4 foundation-large-4 foundation-medium-4 foundation-small-4" id="column_14653741763071e117d7f"><img id="simpleimage_14653743851712de1edf0" n2-actions="[{'action':'url','params':[{'link':'http://www.techrepublic.com/resource-library/whitepapers/8-tips-to-stay-ahead-of-the-top-2016-data-protection-trends/','title':'http://www.techrepublic.com/resource-library/whitepapers/8-tips-to-stay-ahead-of-the-top-2016-data-protection-trends/','target':'_blank'}],'target':'#simpleimage_14653743851712de1edf0','trigger':'click','title':'navigate-simpleimage'}]" src="https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/8365649809d4a3c69422cd032d392cb4.jpg" style="cursor: pointer; touch-action: manipulation; -webkit-user-drag: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0);"> <p><a href="https://web.archive.org/web/20211019154936/http://www.techrepublic.com/resource-library/whitepapers/8-tips-to-stay-ahead-of-the-top-2016-data-protection-trends/" target="_blank" title="http://www.techrepublic.com/resource-library/whitepapers/8-tips-to-stay-ahead-of-the-top-2016-data-protection-trends/">8 Tips To Stay Ahead Of The Top 2016 Data Protection Trends</a></p> </div> <div class="columns n2-studio-grid-col foundation-desktop-4 foundation-large-4 foundation-medium-4 foundation-small-4" id="column_14653741763072a476e64"><img id="simpleimage_1465374939073910bc0ca" n2-actions="[{'action':'url','params':[{'link':'http://www.techrepublic.com/resource-library/whitepapers/forward-thinking/','title':'http://www.techrepublic.com/resource-library/whitepapers/forward-thinking/','target':'_blank'}],'target':'#simpleimage_1465374939073910bc0ca','trigger':'click','title':'navigate-simpleimage'}]" src="https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/546cdc70df83ffa35b04a59c17f3f039.jpg" style="cursor: pointer; touch-action: manipulation; -webkit-user-drag: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0);"> <p><a href="https://web.archive.org/web/20211019154936/http://www.techrepublic.com/resource-library/whitepapers/forward-thinking/" target="_blank" title="http://www.techrepublic.com/resource-library/whitepapers/forward-thinking/">Forward Thinking Backup: Data Protection for the Digital Business</a></p> </div> <div class="columns n2-studio-grid-col foundation-desktop-4 foundation-large-4 foundation-medium-4 foundation-small-4" id="column_146537421835488496460"><img id="simpleimage_1465374944589db6a3a78" n2-actions="[{'action':'url','params':[{'link':'http://www.techrepublic.com/resource-library/whitepapers/top-5-pitfalls-to-avoid-in-your-data-protection-strategy/','title':'http://www.techrepublic.com/resource-library/whitepapers/top-5-pitfalls-to-avoid-in-your-data-protection-strategy/','target':'_blank'}],'target':'#simpleimage_1465374944589db6a3a78','trigger':'click','title':'navigate-simpleimage'}]" src="https://web.archive.org/web/20211019154936im_/https://n2ps.storied.co/uploads/75fab975e0bd79fa5db3c444768ddcfc.jpg" style="cursor: pointer; touch-action: manipulation; -webkit-user-drag: none; -webkit-tap-highlight-color: rgba(0, 0, 0, 0);"> <p><a href="https://web.archive.org/web/20211019154936/http://www.techrepublic.com/resource-library/whitepapers/top-5-pitfalls-to-avoid-in-your-data-protection-strategy/" target="_blank" title="http://www.techrepublic.com/resource-library/whitepapers/top-5-pitfalls-to-avoid-in-your-data-protection-strategy/">Top 5 Pitfalls To Avoid In Your Data Protection Strategy</a></p> </div> </div> </section> <section class="n2-studio-editable" id="n2section_1465373923942ea3a6b43"> <div class="spacer n2-spacer" data-height="295.75" id="n2spacer_1465373950029663a41ed" style=""></div> <div class="foundation-large-default foundation-medium-default foundation-small-default foundation-desktop-preset foundation-large-preset foundation-medium-preset foundation-small-preset nav-overlay widget-outlines n2-inlinegrid n2-studio-grid-row row undefined" display="%7B%22tabletPortraitStyle%22%3A%22block%22%2C%22landscapeStyle%22%3A%22block%22%2C%22tabletLandscapeStyle%22%3A%22block%22%2C%22iphonePortraitStyle%22%3A%22block%22%7D" id="inlinegrid_1524658285725cadbdf7e" n2-background-image="none" name="Inline Grid" style="pointer-events: none; overflow: hidden;"> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-8 foundation-large-8 foundation-medium-8 foundation-small-8" display="block" id="column_1524658285726d5ff3957" name="Column 1"> </div> <div class="columns n2-studio-grid-col widget-outlines foundation-desktop-4 foundation-large-4 foundation-medium-4 foundation-small-4" display="block" id="column_1524658285726252505c6" style=""></div> </div> </section> <iframe class="element-height-observer-iframe" style="pointer-events: none; position: absolute; display: block; overflow: auto; height: 100%; width: 100%; top: 0px; bottom: 0px; left: 0px; border: 0px; background-color: transparent;"></iframe> </article></body></html><!-- FILE ARCHIVED ON 15:49:36 Oct 19, 2021 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 03:03:05 Dec 04, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.488 exclusion.robots: 0.025 exclusion.robots.policy: 0.015 esindex: 0.01 cdx.remote: 18.784 LoadShardBlock: 131.418 (3) PetaboxLoader3.datanode: 93.997 (4) PetaboxLoader3.resolve: 151.913 (2) load_resource: 182.785 -->