Home Applications Automated Data Protection for Virtualized, Mission-Critical Apps

Automated Data Protection for Virtualized, Mission-Critical Apps

0
Automated Data Protection for Virtualized, Mission-Critical Apps
0

As a channel partner, you need ways to help your customers protect their data and also set yourself apart from the competition. That’s what you get with the updated and greatly enhanced Dell EMC Data Protection Suite for Applications. With this solution your customers gain three key, game-changing advantages: performance, automation and self-service.

Here are more details on each:

Performance

Dell EMC Data Protection Suite for Applications uses three direct data paths either from the application, hypervisor or Dell EMC primary storage to Dell EMC Data Domain protection storage. Direct data paths boost backup and restore performances dramatically, compared to traditional approaches that typically require intermediary servers. Take these performance gains compared to traditional backup methods, for example:

  • Application direct: Up to 50% faster backups than traditional backup methods, up to 99% bandwidth reductions[1]
  • Storage direct: Up to 20x faster backups than traditional backup methods, 10x faster data recovery[2]
  • Hypervisor direct: Up to 5x faster backups than traditional backup methods [3]

Direct data paths reduce or eliminate impacts to application servers, which could otherwise degrade performance of the applications they support. The same goes for protecting data generated from applications using hypervisors on virtual machines, which can be difficult to back up with conventional data protection tools. By broadening the scope of coverage and accelerating performance so significantly, admins can meet even the most stringent service-level objectives (SLOs) for mission-critical applications.

By eliminating intermediary servers customers can reduce the amount of infrastructure needed, which can save both capital costs and operating expenses, the latter by reducing data center space and power requirements. It also saves IT staff the time needed for associated management and maintenance chores.

Read the entire article here, Automated Data Protection for Virtualized, Mission-Critical Apps

Via the fine folks at Dell

Categories:
Dell Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more.

Share your view, leave a comment below:

Featured Resources:

Related Articles:

| LATEST FEATURED RESOURCES

White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]

    Downloads

      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          deviceTRUST Contextual Security – Use Case (Conditional Access based on Security State) Video

          We show how the status of the security components on the endpoint (firewall, anti-spyware, anti-virus, Windows updates, etc.) can be used to control access to the virtual session. This video is from the fine folks at deviceTRUST.

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors

          Close