Feeds

Acronis on the prowl?

Out to become bigger dog in backup yard

Beginner's guide to SSL certificates

Combine that with a deduplicated image data store and the restore time to system availability looks more acceptable. Also, Acronis mid-market customers are unlikely to have their own disaster recovery data centres and facilities so an Acronis deduplicated and cloud-based offering would provide extra DR cover for these customers.

It is unlikely, extremely so, that Acronis would build its own data centre infrastructure for this. Instead, it would look to hire server and storage resources in hosting service facilities.

Donahue adds that the Acronis business has an element of counter-cyclicality to it because, in these straitened times, customers look to extend the lives of existing servers, and so take out additional backup and restore insurance in case their ageing servers break.

We should think of the Acronis technology roadmap evolving along these lines but we should also think of Acronis acquiring other companies. Donahue reckons the valuation of companies with negative cash flows is becoming quite low because of the recession and venture capital/private equity backers wanting to stop pouring cash into what have become drains with no upside visible for several quarters, possibly years.

Donahue suggests that a potential purchase could offer a significant channel capability in a geography where Acronis is less well represented, and could also offer products and/or technology that complement the existing Acronis ones.

Acronis wants to bulk up and become a bigger dog in the yard; a David wants to join the Goliaths. Donahue says success comes from good execution and, as far as he is concerned, he can see an achievable transition ahead to becoming top dog in the deduplicated and cloud-enhanced bare metal restore and backup market.

EMC's Mozy, Carbonite and other cloud data protection providers can see the same things as he can and, like him, they probably reckon there is going to be a lot of displacement, meaning consolidation, in this fragmented market. They too will be aiming to counter the same cloud pipe bandwidth limitation that Acronis has in mind.

Donahue seems clear that Acronis' ace in the hole is the bare metal and app-aware restore. Let the others try and duplicate that. ®

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.