On a Quest for software-defined secondary storage – abstraction comes to backups
Quest‘s secondary storage systems have reached the next level – in the nick of time. The exponential rise in the amount of data traffic which an enterprise collects and consumes means there’s now massive pressure of so-called “secondary” data. That is, data that’s backed up to, and restored from (plus various other uses, too, like dev teams duplicating whole archives to test new apps on).
Without innovative solutions, the amounts of data involved mean backups are getting bigger, slower, and costing more to store. No-one wants to delete data – it represents the ability to recover in the event of disaster or accident – so the problem of managing the data intelligently is falling to vendors like Quest.
Quest QoreStor is bringing the abstracted software methodology to storage of secondary data. It’s a software-defined storage platform based on Quest’s DR Appliance.
It is a software application that can be installed on virtually any server hardware or virtual platform running Linux, and can be deployed across on-prem assets and out to the cloud – all under one controlling system.
This is no tear-it-down-and-start-again solution, either. QoreStor supports many backup software instances – Veritas, IBM, Dell, Veeam, Oracle, Microsoft, Arcserve, and so forth.
It works across Azure and AWS too, homogenizing the storage of the whole back-up and restore capabilities needed by today’s organizations. But it’s not just secondary storage with a management interface. Sure, it deploys across hardware and hypervisor, cloud and bare metal, but its advantages go much deeper.
The solution can use client-side processing to more effectively de-dupe backups, lowering backup archive space requirements by a staggering factor of 20:1. That means the monthly storage bills which burden today’s data-savvy enterprise can be slashed, now and well into the future.
Data security and governance strictures are paramount, too. All archives are encrypted at rest (in-house or on-cloud) and are compliant with FIPS 140-2. AES 256 bit keys can be generated once or can be scheduled to change.
By not using a fixed data block size, backups and restores are quicker by a magnitude, due in part thanks to the stores’ smaller size. Customers have reported data ingest rates of up to 20 terabytes per hour.
And because only unique data is ever replicated (not unique data blocks), replication window size is also drastically lowered. For the business, that means more parallel backups, if required, or applications not slowed by massive data movements.
The smaller requirements for data bandwidth is good for the whole data topology; businesses can back up to a WAN, but with wired LAN-type speeds and efficiencies. All RPOs (recovery point objectives) will appear to be LAN-equivalent, despite taking place over a mixed, geographically spread wide area network.
Data recovery and backup teams will be pleased to learn that storage groups (all virtualized, of course) can be spun up easily, allowing separate storage policies to be defined – within a single QoreStor platform.
Even complex multitenant policies are managed from a single console. QoreStor is simple to maintain, use & manage.
Benefits to your IT function are, therefore:
- Reduction of storage costs on-premises and in the cloud(s) of your choice.
- Accelerated backups, with protocol accelerators and deduping.
- Replication times slashed.
- Improvements in security, compliant with FIPS 140-2.
- Maximized ROI on network infrastructure investments. Abstraction is platform agnostic, so no equipment or systems will head to landfill.
- A lower total cost of ownership through all-inclusive licensing.
To learn more about the way software-defined secondary data can change your organization’s data protection, backup and restore policies, get in touch with a Quest representative local to your area, or start with a free trial or download.
- Bring USA-style customer care to your field service business, with CSDP
- To err is humane: building a safe network for your employees, with WatchGuard
- The Manipulation of the Human Factor: Email Security Explored
- Protecting the VAPs (very attacked people) and the VIPs, with Proofpoint
- Your next-gen call center agent will be born in AI, says IBM