Feeds

EMC NetWorker adds de-dupe and CDP management

Avamar and RecoverPoint find a daddy

Intelligent flash storage arrays

SNW EMC is teaching NetWorker, its long-in-tooth flagship backup and recovery application some new tricks in time for Storage Networking World in Texas.

The company is integrating de-duplication and continuous data protection (CDP) technology into the software via the new kids on EMC's lineup, Avamar and RecoverPoint software.

While the addition won't yet replace the stand-alone products, users will be able to set policies and manage them through the NetWorker environment.

The move will put NetWorker back in the spotlight as the center of its backup portfolio, said Rob Emsley, EMC senior director of software product marketing.

Avamar de-dupe is integrated with the NetWorker client to enable management for scheduling, policy creation, monitoring and reporting through the NetWorker Management Console. Through the same interface, customers can use RecoverPoint technology to do things such as schedule CDP snapshots, set policies and browse the index of RecoverPoint-based snapshots.

The integration comes from the fruits of EMC's $165m purchase of Avamar and the $153m buyout of Kashya last year.

More integration between Avamar and NetWorker is needed.

For instance, de-duped backups are directed at a Avamar target, while non-de-duped backups go to a NetWorker target. But Emsley points out that the integration is ahead of most backup rivals. Symantec's NetBackup has a PureDisk deduplication service, but no CDP yet. IBM Tivoli Storage Manager offers neither. The exception is CommVault, which puts de-dupe and continuous data replication into the Simpana suite.

EMC said the new features should be up in December.

Disk Library gets bigger

The company has also announced some improvements to the EMC Disk Library (EDL).

EDL will support 1TB SATA II disks, increasing the capacity by about 25 per cent over the previous max of 750GB disk drives. They're also getting an additional level of RAID protection — now configured with RAID 6. EMC is also putting in a new virtual tape migration tool to allow non-disruptive movement of data backed up on tape. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.