Feeds

Bakbone slips disk into product range

Complements and augments tape target

Top 5 reasons to deploy VMware with Tegile

Responding to the inevitable, backup software supplier BakBone is extending its NetVault data backup products to disk as well as tape, building on capabilities it has already introduced, such as NetVault: FastRecover.

The company has said it will introduce an Open Data Protection platform later this year, "extending the company’s focus from traditional tape-based data protection solutions to disk-based technology."

It's increasingly seeing customers adopt server virtualisation - for which tape-based backup is not ideal - and also look cloudwards where, it's variously and generally assumed, tape has little or no role in protecting data.

The idea is for Bakbone to remain the single focus for data protection for its customers, with data flowing to disk or tape - or cloud - targets, and being deduplicated by third-party or BakBone technology.

BakBone says that "by enhancing and replacing components of its virtual tape library with new products and technologies that work with third party applications, BakBone is putting more power into the hands of its users... Customers can leverage existing applications and infrastructure, resulting in fewer systems used to manage the same data multiple times." It wants to float to the top of the data protection heap, even if that means sacrificing use of its own products inside the data protection stack.

It is promising "multiple releases to the market around its new platform and [will] push its product suite to new levels and into new territory."

Perhaps we're going to see an indexing, search and eDiscovery/compliance archive offering take shape?

Jeff Drescher, BakBone's marketing VP, said Bakbone will continue to supply its legacy products but: "BakBone’s new combined suite of disk-based data protection solutions now will allow customers to flexibly protect and make their most critical server and application data available, regardless of whether the data resides in physical, virtual or cloud environments.” ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.