This article can also be found in the Premium Editorial Download "Storage magazine: Lessons learned from creating and managing a scalable SAN."
Download it now to read this article plus other related content.
Enhanced data protection
Features like CDP, encryption, and disk-based backup and recovery are becoming more prevalent, but there are significant differences in how backup programs deliver these features. For example, products such as CommVault's Galaxy and Symantec's Backup Exec allow administrators to manage CDP within the backup software management interface. Hewlett-Packard (HP) Co.'s OpenView Storage Data Protector uses different interfaces and requires separate logins to manage its backup and CDP databases. Though products like OpenView Storage Data Protector and Atempo's Time Navigator store the CDP data in a different database than the backup data, both HP and Atempo plan to create an index that will allow them to use a federated approach to manage data in the two databases.
|Enterprise backup software challengers:|
|Disk backup options|
|Click here for a comprehensive list of the enterprise backup software challengers: Disk backup options (PDF).|
Other backup software vendors offer CDP, but not in the truest sense of the word. For instance, Atempo has three versions of its CDP product: LiveBackup for PCs, LiveBackup Express and LiveServ for Microsoft Exchange. The first two support only desktops and laptops, while the Express version lacks disaster recovery and system rollback capabilities. Syncsort's Backup Express delivers a type of CDP functionality, although the company doesn't market it as CDP. With Backup Express, administrators may set up a schedule to quiesce applications and capture block-level changes to create a consistent and recoverable system image at various times throughout the day. While not true CDP, it allows users to create recoverable images more often than once a day.
Data encryption capabilities also vary widely. For instance, CA's BrightStor ARCserve Backup includes host-based encryption that allows administrators to specify which files they want to include or exclude from encrypting, as well as what level of encryption they wish to apply to files. However, there are several downsides to using host-based encryption: Turning on encryption requires a password to be set prior to initiating the backup and the password must be available when a restore is done. Second, using host-based encryption increases CPU overhead on the server during backup and recovery, which can affect backup performance. Users also need to verify what levels of encryption the backup software supports and which ones they use. Products such as EMC's Retrospect support an older encryption algorithm, DES-56, which, if used, can be hacked in 35 minutes or less by simply using all possible 56-bit key combinations. Syncsort Backup Express and Symantec Backup Exec plan to incorporate encryption into their products later this year.
This was first published in July 2006