Feeds

Acronis on the prowl?

Out to become bigger dog in backup yard

Boost IT visibility and business value

Combine that with a deduplicated image data store and the restore time to system availability looks more acceptable. Also, Acronis mid-market customers are unlikely to have their own disaster recovery data centres and facilities so an Acronis deduplicated and cloud-based offering would provide extra DR cover for these customers.

It is unlikely, extremely so, that Acronis would build its own data centre infrastructure for this. Instead, it would look to hire server and storage resources in hosting service facilities.

Donahue adds that the Acronis business has an element of counter-cyclicality to it because, in these straitened times, customers look to extend the lives of existing servers, and so take out additional backup and restore insurance in case their ageing servers break.

We should think of the Acronis technology roadmap evolving along these lines but we should also think of Acronis acquiring other companies. Donahue reckons the valuation of companies with negative cash flows is becoming quite low because of the recession and venture capital/private equity backers wanting to stop pouring cash into what have become drains with no upside visible for several quarters, possibly years.

Donahue suggests that a potential purchase could offer a significant channel capability in a geography where Acronis is less well represented, and could also offer products and/or technology that complement the existing Acronis ones.

Acronis wants to bulk up and become a bigger dog in the yard; a David wants to join the Goliaths. Donahue says success comes from good execution and, as far as he is concerned, he can see an achievable transition ahead to becoming top dog in the deduplicated and cloud-enhanced bare metal restore and backup market.

EMC's Mozy, Carbonite and other cloud data protection providers can see the same things as he can and, like him, they probably reckon there is going to be a lot of displacement, meaning consolidation, in this fragmented market. They too will be aiming to counter the same cloud pipe bandwidth limitation that Acronis has in mind.

Donahue seems clear that Acronis' ace in the hole is the bare metal and app-aware restore. Let the others try and duplicate that. ®

The essential guide to IT transformation

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Flash could be CHEAPER than SAS DISK? Come off it, NetApp
Stats analysis reckons we'll hit that point in just three years
Object storage bods Exablox: RAID is dead, baby. RAID is dead
Bring your own disks to its object appliances
Nimble's latest mutants GORGE themselves on unlucky forerunners
Crossing Sandy Bridges without stopping for breath
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.