Feeds

FalconStor's flying backup accelerator

Backup idea offloads host

Securing Web Applications Made Simple and Scalable

IP storage software, deduplication and virtual tape library supplier FalconStor is introducing a backup accelerator for its VTL at SNW on 6 April.

A VTL accelerates backup, because data streams from the host server's storage to the VTL at disk ingestion speed, instead of the slower tape ingestion speed. This reduces the backup window - the time needed for the backup - during which the host server is not doing normal operational work.

FalconStor's idea is to remove the backup responsibility from the host and cut the backup window to zero by using its forthcoming VTL Backup Acceleration Option. The company reckons this means backups can be run at any time, will free the host server from dedicating virtually any CPU cycles to backup, and uses a SAN infrastructure instead of a generally slower LAN. It thinks that backup speed can be accelerated 4 - 8 times compared to a host-based backup.

The backup acceleration software is deployed on an x86 server and shares the same pool of storage as the VTL. It provides data access to the backup software and maintains a current copy of the data to be backed up through the SAN infrastructure. It also includes host agents to insure the consistency of the data in the Backup Acceleration Option repository. They require a few CPU cycles for a few seconds and have no impact on production environments.

The product will also include a HyperTrac integration tool for backup applications that ensures that backup operations are processed through the Backup Acceleration Option repository and that all backup processes are streamlined.

FalconStor's VTL Backup Acceleration Option will come as a bundle, including a software license, 16 host agent licenses for Microsoft Windows and/or Linux environments, and one HyperTrac license for any backup software. The software licensing fee for this lot will be $10,000. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.