Feeds

Data Protection Manager flies cloudwards

CloudRecovery links into DPM

Choosing a cloud hosting partner with confidence

Iron Mountain has enhanced its CloudRecovery product with support for Data Protection Manager (DPM) 2010 so that users can send DPM-gathered data to its cloud storage vault.

The company says the latest release of CloudRecovery offers multi-terabyte scalability and retains support for DPM 2007 with SP 1. It can retain data for periods between 30 days and seven years.

CloudRecovery also has an ability to restore the DPM SQL Server database, as well as DPM data. Ironically, considering the modernity of the cloud, Iron Mountain is returning to sneakernet - well, a turbocharged sneakernet - as it offers "an on-site Iron Mountain TurboRestore appliance with Data Shuttle services for quickly backing up and restoring data, which allows customers to ship an appliance for sending and receiving large volumes of data without burdening their networks."

The cloud is like Doctor Who's Tardis - an immense space inside accessed through a very small door. It can hold a lot of data but sending or recovering massive amounts of it takes an exceedingly long time. When large restores or backups are being done the cloud's advantages over tape vanish.

Seagate's i365 business has launched the EVault for DPM 2010 backup and recovery appliance. It offers a cloud storage option for DPM and extends DPM 2010, i365 says, to non-Microsoft platforms. It uses the i365 cloud which Seagate says offers "ironclad protection of data".

Seagate doesn't say anything about a turbocharged sneakernet for massive amounts of data, but EVault can restore data to a virtual data centre in the i365 cloud.

The EVault appliance hardware will be Dell's and will ship factory-installed with both the DPM and EVault software. There is a common user interface to monitor a customer's heterogeneous environment, and a wizard-driven setup process.

EVault for DPM on Dell hardware is scheduled to be available in June and can be ordered today through i365 and Microsoft channel partners. Prices start from $9,995.

Iron Mountain hasn't said anything about availability or pricing of its latest CloudRecovery product and wasn't able to immediately tell us. ®

Remote control for virtualized desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.