Feeds

Virtual Server backup software ranked

CommVault Simpana and CA ARCserve top of the pops

Internet Security Threat Report 2014

Analyst rankings of virtual server backup software put CommVault Simpana 9 and CA ARCserve r15 in place as the best all-round products.

The DCIG 2011 Virtual Server Backup Software Buyer's Guide is a collaboration between two analyst firms: Jerome Wendt's DCIG and SMB Research. They admit to paid assignments from some of the vendors whose products were reviewed, but say they were not paid to produce their report and it is an independent evaluation.

The analysts sent questionnaires to some 30 firms and received 24 replies. They classified the questions into various aspects of virtual server backup and recovery, weighted the replies according to user-related conversations, and scored the vendors' replies. The mean and the statistical deviation were calculated and vendors' products ranked on both the individual aspects and overall, with five rankings from Basic, through Good to Excellent, and then Recommended.

The highest recommended product was separated out as Best-in-Class and this was CommVault's Simpana 9 product with a score of 94. It was just one point ahead of CA's ARCserve r215, which was recommended because it scored more than 1.25 standard deviations above the mean.

In the Excellent category were six vendors' products (with scores in brackets): Arkeia Network Backup v9 (89); IBM Tivoli Storage Manager 6 (88); EMC Avamar (87); HP Data Protector 6.1 (86), Symantec Backup Exec 2010 (86); and Quest's vRanger PRO 4.5 (84). Scores ranged from 0.5 standard deviations above the mean to 1.24 above it.

The Good category, ranging from 0.25 standard deviations below the mean to 0.49 above, had nine products identified. The Basic category had seven products identified, with scores more than 0.25 standard deviations below the mean. This bunch included Microsoft's Data Protection Manager 2010 and Seagate's i365 EVault Data Protection Software.

The 81-page report is freely available from CommVault's website, at a cost of providing sales lead-type information. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.