White Papers

6 #215296 ©2009 IDC
Dell's PowerVault TL2000, TL4000, or ML6000 automated tape libraries, providing an
extra measure of security by supporting removable media that can be vaulted offsite
for archiving and disaster recovery.
The PowerVault DL2000 arrives factory installed with either CommVault Simpana
software or Symantec Backup Exec. The version powered by CommVault features
deduplication capabilities that store files only once, distributed protection of branch
offices, continuous protection of data, one-step individual recovery, and synthetic full
backups. The Symantec Backup Exec version offers patent-pending Granular
Recovery technology for speedy restores; continuous data protection for Exchange;
low-cost, easy protection for VMware™ Virtual Machines; and protection for desktops
and laptops.
Dell will support the DL2000 through its ProSupport service that provides 24 x 7 direct
access to Dell Expert Centers, fast-track dispatch for Dell-certified technicians, and
escalation management through Dell's Global Command Centers. In addition, Dell
has introduced services that help analyze a customer's environment and develop
action plans using a tool-based approach designed to improve data recovery
capabilities.
IDC has discovered that SMB customers value seamless integration when
considering the purchase of a new data protection solution. Additionally, IDC's annual
U.S. SMB Survey on Data Protection found that SMB customers' buying criteria for
data protection solutions are heavily influenced by product functionality, ease of use,
and pricing. IDC asked those same United States–based SMBs which approaches to
data protection they use today and will likely use 12 months from now. Currently, tape
usage is very prevalent, as well as backing up to disk then migrating to tape. In
addition, a high proportion of SMBs are using local replication, snapshots, and
mirroring. However, in the coming year, more of those SMB customers will be
forgoing tape altogether and using solely disk-based storage solutions for data
protection (see Figure 2).